Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control

被引:0
作者
Elabd, Emad [1 ]
Coquery, Emmanuel [1 ]
Hacid, Mohand-Said [1 ]
机构
[1] Univ Claude Bernard Lyon 1, LIRIS CNRS UMR UFR Informat 5205, 43,Blvd 11 Novembre 1918, F-69622 Villeurbanne, France
来源
22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010) | 2010年
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, Web services technologies are adequate for designing and implementing complex inter-enterprise business applications. Web services choreography defines the required behaviors of Web services which participate in implementing such applications with their interactions through message exchanges. The designer of the application collects the Web services that implement the defined choreography. The selected services must be compatible and perform the required operations of the application. Therefore, checking the compatibility between Web services to guarantee that they can interact correctly is a main step in the verification process. This type of checking is based on the services descriptions. Enriching services descriptions by including their behaviours is becoming more and more important. This behaviour can be described by business protocols representing the possible sequences of message exchanges. Since a lot of Web services use access control policies to restrict the access to authorized consumers, these policies should be a part of the service description. Selecting compatible Web services for implementing service choreography is the main contribution of this work. This is achieved by modeling and checking the compatibility between Web services by analyzing their business protocols after assigning the access control policies which will be presented using an ontology.
引用
收藏
页码:235 / 240
页数:6
相关论文
共 50 条
[21]   Access control architecture for web services [J].
Yuan, SJ ;
Hu, YF .
GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 :1004-1007
[22]   Interactive access control for Web Services [J].
Koshutanski, H ;
Massacci, F .
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 :151-166
[23]   An ontological approach for managing and selecting QoS Web services [J].
Moo-Mena, Francisco ;
Hernandez-Ucan, Rafael ;
Rios-Martinez, Jorge ;
Gomez-Montalvo, Jorge .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (05) :3187-3197
[24]   A Process Algebra Approach for the Compatibility Analysis of Web Services [J].
Shu, Chen ;
Qing, Wu Guo ;
Jing, Xiao .
FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, :303-306
[25]   On the verification of web services compatibility: A Petri net approach [J].
De Backer, M .
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2004: OTM 2004 WORKSHOPS, PROCEEDINGS, 2004, 3292 :810-821
[26]   A Multivariate Approach for Checking Resiliency in Access Control [J].
Crampton, Jason ;
Gutin, Gregory ;
Watrigant, Remi .
ALGORITHMIC ASPECTS IN INFORMATION AND MANAGEMENT, 2016, 9778 :173-184
[27]   A Big Data approach to enhance the integration of Access Control Policies for Web Services [J].
Alodib, Mohammed ;
Malik, Zaki .
2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, :41-46
[28]   A defeasible policy based access control approach for semantic web services composition [J].
Hu, Luokai, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18)
[29]   Towards a Bridge Ontology Based Approach of Access Control for Semantic Web Services [J].
Hu Luokai ;
Wei Xiong ;
Zhao Kai ;
Wang Jun .
INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (03) :963-968
[30]   Timed Model Checking Based Approach for Web Services Analysis [J].
Guermouche, Nawal ;
Godart, Claude .
2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, :213-221