Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control

被引:0
作者
Elabd, Emad [1 ]
Coquery, Emmanuel [1 ]
Hacid, Mohand-Said [1 ]
机构
[1] Univ Claude Bernard Lyon 1, LIRIS CNRS UMR UFR Informat 5205, 43,Blvd 11 Novembre 1918, F-69622 Villeurbanne, France
来源
22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010) | 2010年
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, Web services technologies are adequate for designing and implementing complex inter-enterprise business applications. Web services choreography defines the required behaviors of Web services which participate in implementing such applications with their interactions through message exchanges. The designer of the application collects the Web services that implement the defined choreography. The selected services must be compatible and perform the required operations of the application. Therefore, checking the compatibility between Web services to guarantee that they can interact correctly is a main step in the verification process. This type of checking is based on the services descriptions. Enriching services descriptions by including their behaviours is becoming more and more important. This behaviour can be described by business protocols representing the possible sequences of message exchanges. Since a lot of Web services use access control policies to restrict the access to authorized consumers, these policies should be a part of the service description. Selecting compatible Web services for implementing service choreography is the main contribution of this work. This is achieved by modeling and checking the compatibility between Web services by analyzing their business protocols after assigning the access control policies which will be presented using an ontology.
引用
收藏
页码:235 / 240
页数:6
相关论文
共 50 条
[31]   A Bounded Model Checking Approach for the Verification of Web Services Composition [J].
Zahoor, Ehtesham ;
Munir, Kashif ;
Perrin, Olivier ;
Godart, Claude .
INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2013, 10 (04) :62-81
[32]   A flexible access control model for Web services [J].
Bertino, E ;
Squicciarini, AC .
FLEXIBLE QUERY ANSWERING SYSTEMS, PROCEEDINGS, 2004, 3055 :13-16
[33]   Access control scheme for web services (ACSWS) [J].
Elsheikh, Selma .
2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, :854-858
[34]   An adaptive access control model for Web services [J].
Bertino, Elisa ;
Squicciarini, Anna C. ;
Martino, Lorenzo ;
Paci, Federica .
INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2006, 3 (03) :27-60
[35]   A role based access control for Web services [J].
Wonohoesodo, R ;
Tari, Z .
2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, :49-56
[36]   Access Control Model for Composite Web Services [J].
Jiang, Huangqin ;
Zhang, Hongqi .
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, :684-688
[37]   Specification of access control policies for web services [J].
Liu, Miao ;
Zhang, Wei ;
Liu, Huai-Liang .
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, :472-475
[38]   Access Control and Information Flow Control for Web Services Security [J].
Kedjar, Saadia ;
Tari, Abdelkamel ;
Bertok, Peter .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (01) :44-76
[39]   Checking the Conformance of Orchestrations with Respect to Choreographies in Web Services: A Formal Approach [J].
Diaz, Gregorio ;
Rodriguez, Ismael .
FORMAL TECHNIQUES FOR DISTRIBUTED SYSTEMS, PROCEEDINGS, 2009, 5522 :231-+