Skip to main content

Ensuring Trustworthiness and Security in Service Compositions

  • Conference paper
  • First Online:
Cyber Security and Privacy (CSP 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 470))

Included in the following conference series:

  • 912 Accesses

Abstract

Future Internet applications can be dynamically composed of atomic services, which exhibit different trustworthiness and security requirements, when being integrated into complex service chains. In that respect, research in the security field works around solutions that can ensure that security characteristics are well addressed in modern, Web-based, ICT environments, aiming to establish a level of trust and confidence on the service consumers. Towards this direction, this paper showcases the results of the EU-funded FP7 Aniketos project, in order to support the secure development life cycle of Web-based service compositions. It elaborates on the design time and runtime capabilities of the Aniketos platform to support security and trust in the specification of composite service processes, by offering service developers the ability to efficiently express their security requirements and service providers the capability to track security breaches and threats and support decisions on the appropriate mitigation actions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.activiti.org

  2. 2.

    OSGi Alliance Specifications - http://www.osgi.org/Specifications/HomePage.

  3. 3.

    Available at github.com/AniketosEU.

References

  1. Meland, P.H., Guerenabarrena, J.B., Llewellyn-Jones, D.: The challenges of secure and trustworthy service composition in the Future Internet. In: 2011 6th International Conference on Proceeding of System of Systems Engineering (SoSE). IEEE Computer Society (2011)

    Google Scholar 

  2. FP7-257930 Aniketos project. www.aniketos.eu

  3. Georgia Institute of Technology, “Emerging Cyber Threats Report 2014”. Georgia Tech Cyber Security Summit 2013

    Google Scholar 

  4. Pajaa, E., Choprab, A.K., Giorgini, P.: Trust-based specification of sociotechnical systems. Data Knowl. Eng. 87, 339–353 (2013). doi:10.1016/j.datak.2012.12.005. Elsevier

    Article  Google Scholar 

  5. Paja, E., Dalpiaz, F., Giorgini, P.: Managing security requirements conflicts in socio-technical systems. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 270–283. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. Object Management Group(OMG), Business Process Modelling and Notation (BPMN) specification v2.0, January 2011. www.bpmn.org

  7. Brucker, A.D., Malmignati, F., Merabti, M., Qi, S., Bo, Z.: A Framework for Secure Service Composition. In: Proceedings of the International Conference on Social Computing 2013 (SocialCom), IEEE, pp. 647–652, doi:10.1109/SocialCom.2013.97

  8. Ayed, D., Asim, M., Llewellyn-Jones, D.: An event processing approach for threats monitoring of service compositions. In: Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), IEEE, pp. 1–10, doi:10.1109/CRiSIS.2013.6766363

  9. Hall, R.S., Pauls, K., McCulloch, S., Savage, D.: OSGi in Action. Manning Publications Co., Greenwich (2011)

    Google Scholar 

  10. Cummins, H., Ward, T.: Enterprise OSGi in Action. Manning Publications Co., Birmingham (2013)

    Google Scholar 

  11. Dalpiaz, F., Paja, E., Giorgini, P.: Security requirements engineering via commitments. In: Proceedings of STAST’11, pp. 1–8 (2011)

    Google Scholar 

  12. Brucker, A.D.: Integrating security aspects into business process models. IT Inf. Technol. 55(6), 239–246 (2013). ISSN: 2196-7032. doi:10.1524/itit.2013.2004. http://www.brucker.ch/bibliography/abstract/brucker-securebpmn-2013. Special Issue on Security in Business Processes

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasilios Tountopoulos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Tountopoulos, V., Giannakoudaki, I., Giannakakis, K., Korres, L., Kallipolitis, L. (2014). Ensuring Trustworthiness and Security in Service Compositions. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2014. Communications in Computer and Information Science, vol 470. Springer, Cham. https://doi.org/10.1007/978-3-319-12574-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12574-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12573-2

  • Online ISBN: 978-3-319-12574-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics