Abstract
Internet is offering a variety of services that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Since communications occur along specific channels, it is equally important to guarantee that the interactions between a client and a server never get blocked because either cannot access a selected channel. We address here both these problems, from a formal point of view. A static analysis is presented, guaranteeing that a composition of a client and of possibly nested services respects both security policies for access control, and compliance between clients and servers.
Similar content being viewed by others
References
Abadi M, Fournet C (2003) Access control based on execution history. In: Network and distributed system security symposium, NDSS 2003. The Internet Society
Armbrust M et al (2010) A view of cloud computing. Commun ACM 53(4):50–58
Artikis A, Sergot MJ, Pitt JV (2009) Specifying norm-governed computational societies. ACM Trans Comput Log 10(1)
Baier C, Katoen JP (2008) Principles of model checking. MIT Press, Cambridge
Bartoletti M, Degano P, Ferrari GL (2009) Planning and verifying service composition. J Comput Secur 17(5):799–837
Bartoletti M, Degano P, Ferrari GL, Zunino R (2009) Model checking usage policies To appear in Math. Stuct. Comp. Sci., abridged version in TGC 2008, vol 5474 LNCS
Bartoletti M, Degano P, Ferrari GL, Zunino R (2009) Local policies for resource usage analysis. ACM Trans Program Lang Syst 31(6). doi:10.1145/1552309.1552313
Bartoletti M, Tuosto E, Zunino R (2012) On the realizability of contracts in dishonest systems. In: Sirjani M (ed) COORDINATION, LNCS, vol 7274. Springer, pp 245–260
Bartoletti M, Zunino R (2008) LocUsT: a tool for checking usage policies. Technical Report TR-08-07, Dip. Informatica, Univ. Pisa
Bartoletti M, Zunino R (2010) A calculus of contracting processes. In: LICS. IEEE Computer Society, pp 332–341
Bernsmed K, Jaatun MG, Meland PH, Undheim A (2011) Security SLAs for federated cloud services. In: ARES. IEEE, pp 202–209
Bocchi L, Honda K, Tuosto E, Yoshida N (2010) A theory of design-by-contract for distributed multiparty interactions. In: CONCUR 2010—Concurrency theory, 21th international conference, Lecture notes in computer science, vol 6269. Springer, pp 162–176
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comp Syst 25(6):599–616
Carpineti S, Castagna G, Laneve C, Padovani L (2006) A formal account of contracts for web services. In: Bravetti M, Núñez M, Zavattaro G (eds) WS-FM, LNCS, vol 4184. Springer, pp 148–162
Castagna G, Gesbert N, Padovani L (2009) A theory of contracts for web services. ACM Trans Program Lang Syst 31(5). doi:10.1145/1538917.1538920
Castagna G, Padovani L (2009) Contracts for mobile processes. In: Bravetti M, Zavattaro G (eds) CONCUR, LNCS, vol 5710. Springer, pp 211–228
Degano P, Ferrari GL, Mezzetti G (2011) On quantitative security policies. In: Malyshkin V (ed) PaCT, LNCS, vol 6873. Springer, pp 23–39
Papazouglou M, Georgakopoulos D (2003) Special issue on service oriented computing. Commun ACM 46(10):24–28
van der Aalst WMP, Lohmann N, Massuthe P, Stahl C, Wolf K (2010) Multiparty contracts: agreeing and implementing interorganizational processes. Comput J 53(1):90–106
Author information
Authors and Affiliations
Corresponding author
Additional information
This work has been partially supported by the MIUR PRIN project Security Horizons.
Rights and permissions
About this article
Cite this article
Basile, D., Degano, P. & Ferrari, G.L. A formal framework for secure and complying services. J Supercomput 69, 43–52 (2014). https://doi.org/10.1007/s11227-014-1211-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-014-1211-0