Abstract
This paper presents an approach for building secure service-based coordinated systems. Secure coordination is considered at two levels: abstraction (i.e., specification) and execution (i.e., run level). At the abstraction level, we define a general model enabling to specify coordination and its related non functional properties (such as security). The idea is to use constraints for expressing the application logic of a coordinated system and its required security strategies. Coordination activities are the key concepts used for controlling the execution of participating services. Constraints are specified as pre and post conditions of these coordination activities. At the execution level, we propose an architecture which implements strategies to verify constraints and manage the secure execution of coordination. We propose also an instantiating vade-mecum to configure execution level components according to a specific set of constraints.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alvarez, P., Banares, J.A., Muro-Medrano, P.R., Nogueras, J., Zarazaga, F.J.: A java coordination tool for web-service architectures: The location-based service context. In: Guelfi, N., Astesiano, E., Reggio, G. (eds.) FIDJI 2002. LNCS, vol. 2604, pp. 1–14. Springer, Heidelberg (2003)
BEA Systems, IBM Corporation, Microsoft Corporation: Web Services Coordination (2003)
Belhajjame, K., Vargas-Solar, G., Collet, C.: Defining and coordinating open-services using Workflow. In: Proceedings of the Eleventh International Conference on Cooperative Information Systems. LNCS. Springer, Heidelberg (2003)
IBM Corporation (1999), http://www-306.ibm.com/software/htp/cics/
Object Management Group (2002), http://www.corba.org/
Cremonini, M., Omicini, A., Zambonelli, F.: Coordination in Context: Authentication, Authorisation and Topology in Mobile Agent Applications. In: Ciancarini, P., Wolf, A.L. (eds.) COORDINATION 1999. LNCS, vol. 1594, pp. 416–416. Springer, Heidelberg (1999)
Georgakopoulos, D., Hornick, M.F., Sheth, A.P.: An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure. Distributed and Parallel Databases, 119–153 (1995)
Issarny, V., Bidan, C., Saridakis, T.: Characterizing Coordination Architectures According to Their Non-Functional Execution Properties. In: 31st IEEE International Conference on System Science (1998)
Khan, K.M., Han, J.: A Security Characterisation Framework for Trustworthy Component Based Software Systems. In: IEEE International Computer Software and Applications Conference (2003)
Klint, P., Olivier, P.: The TOOLBUS Coordination Architecture: A Demonstration. In: 5th International Conference on Algebraic Methodology and Software Technology, pp. 575–578. Springer, Heidelberg (1996)
Malone, T.W.: What is Coordination Theory and How Can it Help Design Cooperative Work Systems? In: CSCW 1990: Proceedings of the 1990 ACM conference on Computer-supported cooperative work, pp. 357–370 (1990)
Papadopoulos, G.A., Arbab, F.: Coordination models and languages. Advances in Computers (1998)
Peterson, J.L.: Petri Net Theory and the Modeling of Systems. Prentice Hall PTR, Englewood Cliffs (1981)
Tolksdorf, R.: Coordination Technology for Workflows on the Web: Workspaces. In: Porto, A., Roman, G.-C. (eds.) COORDINATION 2000. LNCS, vol. 1906, pp. 36–50. Springer, Heidelberg (2000)
Microsoft Corporation (2003), http://msdn.microsoft.com/webservices/building/interop/
Workflow Management Coalition: Terminology and Glossary (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vu, THG. (2006). Towards a Secure Service Coordination. In: Grust, T., et al. Current Trends in Database Technology – EDBT 2006. EDBT 2006. Lecture Notes in Computer Science, vol 4254. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11896548_11
Download citation
DOI: https://doi.org/10.1007/11896548_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46788-5
Online ISBN: 978-3-540-46790-8
eBook Packages: Computer ScienceComputer Science (R0)