Abstract
Development of secure solutions requires special care and consideration. In most situations dedicated tools need to be used and strict procedures must be followed. However, more often than not, secure web services must be based on existing technologies and interact with the real world, where special security considerations aren’t made. This introduces a big challenge for designers and developers, who need to integrate existing libraries and tools into a specific secure technology stack. The deployment of the services is equally challenging, as developers want to benefit from the advantages of state-of-the-art platforms and deployment in Cloud environments. This chapter is going to examine how the above mentioned challenges were addressed in the design and development of the Aniketos Platform.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Meland, P.H., Rios, E., Tountopoulos, V., Brucker, A.D.: The aniketos platform. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds.) Secure and Trustworthy Service Composition. LNCS, vol. 8900, pp. 50–62. Springer, Heidelberg (2014)
Meland, P.H., et al.: Security and trustworthiness threats to composite services: Taxonomy, countermeasures, and research directions. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds.) Secure and Trustworthy Service Composition. LNCS, vol. 8900, pp. 10–35. Springer, Heidelberg (2014)
OSGi in Action - Richard S. Hall, Karl Pauls, Stuart McCulloch, and David Savage - Manning Publications Co. (April 2011)
Enterprise OSGi in Action - Holly Cummins and Timothy Ward - Manning Publications Co. (March 2013)
Building Modular Cloud Apps with OSGi - Paul Bakker, Bert Ertman - O’Reilly Media (September 2013)
OSGi Alliance Specifications, http://www.osgi.org/Specifications/HomePage
Activiti Web Site, http://activiti.org/
Apache Karaf Web Site, http://karaf.apache.org/
Zookeper Web Site, http://zookeeper.apache.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Giannakakis, K. (2014). Adopting Existing Communication Platforms for Security Enabling Technologies. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds) Secure and Trustworthy Service Composition. Lecture Notes in Computer Science, vol 8900. Springer, Cham. https://doi.org/10.1007/978-3-319-13518-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-13518-2_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13517-5
Online ISBN: 978-3-319-13518-2
eBook Packages: Computer ScienceComputer Science (R0)