Book Volume 8900 2014

Secure and Trustworthy Service Composition

The Aniketos Approach

ISBN: 978-3-319-13517-5 (Print) 978-3-319-13518-2 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. State of the Art in Secure and Trustworthy Composite Services

    1. No Access

      Chapter

      Pages 1-9

      Composite Services with Dynamic Behaviour

    2. No Access

      Chapter

      Pages 10-35

      Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions

    3. No Access

      Chapter

      Pages 36-49

      Adopting Existing Communication Platforms for Security Enabling Technologies

  3. The Aniketos Platform

    1. No Access

      Chapter

      Pages 50-62

      The Aniketos Platform

    2. No Access

      Chapter

      Pages 63-78

      The Socio-technical Security Requirements Modelling Language for Secure Composite Services

    3. No Access

      Chapter

      Pages 79-94

      From Consumer Requirements to Policies in Secure Services

  4. Design-Time Support Framework

    1. No Access

      Chapter

      Pages 95-109

      Security Requirements Engineering with STS-Tool

    2. No Access

      Chapter

      Pages 110-120

      Using SecureBPMN for Modelling Security-Aware Service Compositions

    3. No Access

      Chapter

      Pages 121-135

      The Aniketos Service Composition Framework

    4. No Access

      Chapter

      Pages 136-149

      Compliance Validation of Secure Service Compositions

    5. No Access

      Chapter

      Pages 150-172

      Aggregation and Optimisation of Trustworthiness of Composite Services

  5. Run-Time Support Framework

    1. No Access

      Chapter

      Pages 173-191

      Monitoring Threats to Composite Services within the Aniketos Run-Time Framework

    2. No Access

      Chapter

      Pages 192-202

      Security Policy Monitoring of Composite Services

  6. Case Studies and Evaluation

    1. No Access

      Chapter

      Pages 203-218

      The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management

    2. No Access

      Chapter

      Pages 219-233

      Supporting Security and Trust in Complex e-Government Services

    3. No Access

      Chapter

      Pages 234-246

      Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome

  7. Back Matter

    Pages -