A security framework for developing service-oriented software architectures

被引:6
作者
Rafe, Vahid [1 ]
Hosseinpouri, Ramin [1 ]
机构
[1] Arak Univ, Dept Comp Engn, Fac Engn, Arak 3815688349, Iran
关键词
service-oriented architecture; security modeling; formal methods; model-driven development;
D O I
10.1002/sec.1222
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The usually heterogeneous and decentralized nature of entities in the service-oriented architecture has paved the ground for the implementation of approaches distributed according to the constantly changing needs of business. Also, as the distribution of entities and processes increases, the need to provide security over software and hardware sources, which have reached the public thanks to an open space as a result of the service-oriented architecture, is felt. Therefore, security modeling at the level of service-oriented architecture can boost system reliability and enhance its stability once applied and employed. This research provides a secure framework through which to develop software based on the service-oriented architecture. The proposed framework has been modeled using the SoaML profile, which has been introduced for modeling service-oriented environments. The framework's security aspects have been tested by the modeling and specification language Alloy, which is based on the first-order logic. Its accuracy has also been well investigated. Tapping into the model-driven development, this framework can provide an answer to existing security challenges for service-oriented architecture software. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:2957 / 2972
页数:16
相关论文
共 37 条
[1]  
Abi-Antoun M., 2010, P IEEEACM INT C AUTO, P3, DOI [10.1145/1858996.1859001, DOI 10.1145/1858996.1859001]
[2]   Formalizing service-oriented architectures [J].
Arab Academy for Banking and Financial Sciences .
IT Prof, 2008, 4 (34-38) :34-38
[3]   A new approach on interactive SOA security model based on automata [J].
Amouzegar, Hamidreza ;
Mohammadi, Shahriar ;
Tarokh, Mohammad Jafar ;
Hidaji, Anahita Naghilouye .
7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, :667-671
[4]  
[Anonymous], LANGUAGE ANAL
[5]  
[Anonymous], 2005, WORKSH SOFTW SEC ASS
[6]  
[Anonymous], SECURITY ENG SERVICE
[7]  
Atkinson B, 2002, INT BUSINESS MACHINE, V1
[8]   On the Impact of Formal Methods in the SOA [J].
Bocchi, Laura ;
Ciancarini, Paolo .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 160 :113-126
[9]  
Bunke M, 2011, LECT NOTES COMPUT SC, V6542, P156, DOI 10.1007/978-3-642-19125-1_12
[10]  
Eastlake D., 2002, W3C RECOMMENDATION, V12