A Requirement-Driven Method for Secure and Reliable Web Service Composition

被引:3
作者
Fan, Guisheng [1 ,2 ]
Yu, Huiqun [1 ]
Wu, Qiang [3 ]
Chen, Liqiong [4 ]
Liu, Dongmei [1 ]
机构
[1] E China Univ Sci & Technol, Dept Comp Sci & Engn, Shanghai 200237, Peoples R China
[2] Wuhan Univ, State Key Lab Software Engn, Wuhan, Peoples R China
[3] China Construct Bank, Zhejiang Branch, Int Business Dept, Hangzhou, Zhejiang, Peoples R China
[4] Shanghai Inst Technol, Dept Comp Sci & Informat Engn, Shanghai, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2013年 / 14卷 / 03期
关键词
Web service; Petri net; Reliability; Security; Requirement; TRUST NEGOTIATION; DISCOVERY; SELECTION; MODEL;
D O I
10.6138/JIT.2013.14.3.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service composition is an effective way to build complex Web service applications. However, it is a challenge to enforce security and reliability of those applications due to the uncertainty of service quality in distributive and heterogeneous environment. This paper proposes a novel method to compose Web services for high security and reliability, which is driven by the requirements of service consumers. Petri nets are used to precisely describe the process of service composition in order to articulate the logic relationship between components. Based on this, a strategy for analyzing the compositionality of service is presented, and a reliable service composition method and its enforcement technique are proposed. Theories of Petri nets help prove the effectiveness of strategy. Finally, a case study of Travel Service demonstrates the feasibility of our method.
引用
收藏
页码:485 / 496
页数:12
相关论文
共 50 条
  • [21] A Risk-driven Selection Approach for Transactional Web Service Composition
    Liu, Hai
    Zhang, Weimin
    Ren, Kaijun
    Liu, Cancan
    Zhang, Zhuxi
    2009 EIGHTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2009, : 391 - +
  • [22] Model Driven Secure Web Applications
    Idani, Akram
    PROCEEDINGS OF THE FIFTH EUROPEAN CONFERENCE ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS (ECBS 2017), 2017,
  • [23] Model-Driven Development of Secure Service Applications
    Borek, Marian
    Moebius, Nina
    Stenzel, Kurt
    Reif, Wolfgang
    PROCEEDINGS OF THE 2012 IEEE 35TH SOFTWARE ENGINEERING WORKSHOP (SEW 2012), 2012, : 62 - 71
  • [24] Which Secure Transport Protocol for a Reliable HTTP/2-based Web Service : TLS or QUIC ?
    Saverimoutou, Antoine
    Mathieu, Bertrand
    Vaton, Sandrine
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 879 - 884
  • [25] Coordination strategy for reliable service composition and its analysis
    Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
    Jisuanji Xuebao/Chinese Journal of Computers, 2008, 31 (08): : 1445 - 1457
  • [26] Aspect Oriented Approach to Building Secure Service Composition
    Fan, Guisheng
    Yu, Huiqun
    Chen, Liqiong
    Liu, Dongmei
    17TH ASIA PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2010), 2010, : 176 - 185
  • [27] Secure Composition of Cascaded Web Services
    Shafiq, Basit
    Chun, Soon
    Vaidya, Jaideep
    Badar, Nazia
    Adam, Nabil
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 137 - 146
  • [28] Semantic Web Service Composition Method Based on Fluent Calculus
    Chifu, Viorica R.
    Salomie, Ioan
    Harsa, Ioana
    Gherga, Marius
    11TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2009), 2009, : 325 - 332
  • [29] A Web Service Composition Method Based on Multi-path
    Dong, Jian
    2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 430 - 432
  • [30] An improved discrete immune optimization algorithm based on PSO for QoS-driven web service composition
    Zhao, Xinchao
    Song, Boqian
    Huang, Panyu
    Wen, Zichao
    Weng, Jialei
    Fan, Yi
    APPLIED SOFT COMPUTING, 2012, 12 (08) : 2208 - 2216