Composable information flow verification for service chain based on model checking

被引:0
|
作者
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an
来源
Xi, Ning | 1600年 / Editorial Board of Journal on Communications卷 / 35期
基金
中国国家自然科学基金;
关键词
Composibility; Information flow security; Model checking; Service chain;
D O I
10.3969/j.issn.1000-436x.2014.11.003
中图分类号
学科分类号
摘要
A composable information verification approach is proposed for the secure service chain composition. Based on the secure service component, the security constraints for the component's composibility is specified and the information flow verification algorithms is proposed. Through the experiments and simulation, it shows that the approach can decrease the verification cost effectively and improve the efficiency of the verification. ©, 2014, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:23 / 31
页数:8
相关论文
共 20 条
  • [1] Endrei M., Ang J., Arsanjani A., Et al., Patterns: Service Oriented Architecture and Web Services , (2004)
  • [2] Joanna N., The Personal Web: Smart internet for me , Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research , (2010)
  • [3] Yu T., Zhang Y., Lin K.J., Efficient algorithms for Web services selection with end-to-end QoS constraints , ACM Transactions on the Web (TWEB), 1, 1, pp. 103-126, (2007)
  • [4] Long J., Yuan X.P., Guo W.H., A policy for the trusted QoS evaluation and service selection with environment aware , Acta Electronica Sinica, 40, 6, pp. 1133-1140, (2012)
  • [5] Bertino E., Squicciarini A.C., Mevi D., A fine-grained access control model for Web services , SCC , pp. 33-40, (2004)
  • [6] Bhatti R., Bertino E., Ghafoor A., Trust-based context-aware access control model for Web-services , ICWS , pp. 184-191, (2004)
  • [7] Zheng Z.B., Zhu J.M., Lyu M.R., Service-generated big data and big data-as-a-service: An overview, 2013 IEEE International Congress on Big Data , pp. 403-410, (2013)
  • [8] Volpano D., Irvine C., Smith G., A sound type system for secure flow analysis , Journal of Computer Security, 4, 2, pp. 167-187, (1996)
  • [9] Ferrante J., Ottenstein K.J., Warren J.D., The program dependence graph and its use in optimization , ACM Transactions on Programming Languages and Systems, 9, 3, pp. 319-349, (1987)
  • [10] Dimitrova R., Finkbeiner B., Kovacs M., Et al., Model Checking Information Flow in Reactive Systems. Verification, Model Checking, and Abstract Interpretation , pp. 169-185, (2012)