Skip to main content
Log in

A formal framework for secure and complying services

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet is offering a variety of services that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Since communications occur along specific channels, it is equally important to guarantee that the interactions between a client and a server never get blocked because either cannot access a selected channel. We address here both these problems, from a formal point of view. A static analysis is presented, guaranteeing that a composition of a client and of possibly nested services respects both security policies for access control, and compliance between clients and servers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abadi M, Fournet C (2003) Access control based on execution history. In: Network and distributed system security symposium, NDSS 2003. The Internet Society

  2. Armbrust M et al (2010) A view of cloud computing. Commun ACM 53(4):50–58

    Article  Google Scholar 

  3. Artikis A, Sergot MJ, Pitt JV (2009) Specifying norm-governed computational societies. ACM Trans Comput Log 10(1)

  4. Baier C, Katoen JP (2008) Principles of model checking. MIT Press, Cambridge

    MATH  Google Scholar 

  5. Bartoletti M, Degano P, Ferrari GL (2009) Planning and verifying service composition. J Comput Secur 17(5):799–837

    Google Scholar 

  6. Bartoletti M, Degano P, Ferrari GL, Zunino R (2009) Model checking usage policies To appear in Math. Stuct. Comp. Sci., abridged version in TGC 2008, vol 5474 LNCS

  7. Bartoletti M, Degano P, Ferrari GL, Zunino R (2009) Local policies for resource usage analysis. ACM Trans Program Lang Syst 31(6). doi:10.1145/1552309.1552313

  8. Bartoletti M, Tuosto E, Zunino R (2012) On the realizability of contracts in dishonest systems. In: Sirjani M (ed) COORDINATION, LNCS, vol 7274. Springer, pp 245–260

  9. Bartoletti M, Zunino R (2008) LocUsT: a tool for checking usage policies. Technical Report TR-08-07, Dip. Informatica, Univ. Pisa

  10. Bartoletti M, Zunino R (2010) A calculus of contracting processes. In: LICS. IEEE Computer Society, pp 332–341

  11. Bernsmed K, Jaatun MG, Meland PH, Undheim A (2011) Security SLAs for federated cloud services. In: ARES. IEEE, pp 202–209

  12. Bocchi L, Honda K, Tuosto E, Yoshida N (2010) A theory of design-by-contract for distributed multiparty interactions. In: CONCUR 2010—Concurrency theory, 21th international conference, Lecture notes in computer science, vol 6269. Springer, pp 162–176

  13. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comp Syst 25(6):599–616

  14. Carpineti S, Castagna G, Laneve C, Padovani L (2006) A formal account of contracts for web services. In: Bravetti M, Núñez M, Zavattaro G (eds) WS-FM, LNCS, vol 4184. Springer, pp 148–162

  15. Castagna G, Gesbert N, Padovani L (2009) A theory of contracts for web services. ACM Trans Program Lang Syst 31(5). doi:10.1145/1538917.1538920

  16. Castagna G, Padovani L (2009) Contracts for mobile processes. In: Bravetti M, Zavattaro G (eds) CONCUR, LNCS, vol 5710. Springer, pp 211–228

  17. Degano P, Ferrari GL, Mezzetti G (2011) On quantitative security policies. In: Malyshkin V (ed) PaCT, LNCS, vol 6873. Springer, pp 23–39

  18. Papazouglou M, Georgakopoulos D (2003) Special issue on service oriented computing. Commun ACM 46(10):24–28

  19. van der Aalst WMP, Lohmann N, Massuthe P, Stahl C, Wolf K (2010) Multiparty contracts: agreeing and implementing interorganizational processes. Comput J 53(1):90–106

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pierpaolo Degano.

Additional information

This work has been partially supported by the MIUR PRIN project Security Horizons.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Basile, D., Degano, P. & Ferrari, G.L. A formal framework for secure and complying services. J Supercomput 69, 43–52 (2014). https://doi.org/10.1007/s11227-014-1211-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-014-1211-0

Keywords

Navigation