Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control

被引:0
作者
Elabd, Emad [1 ]
Coquery, Emmanuel [1 ]
Hacid, Mohand-Said [1 ]
机构
[1] Univ Claude Bernard Lyon 1, LIRIS CNRS UMR UFR Informat 5205, 43,Blvd 11 Novembre 1918, F-69622 Villeurbanne, France
来源
22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010) | 2010年
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, Web services technologies are adequate for designing and implementing complex inter-enterprise business applications. Web services choreography defines the required behaviors of Web services which participate in implementing such applications with their interactions through message exchanges. The designer of the application collects the Web services that implement the defined choreography. The selected services must be compatible and perform the required operations of the application. Therefore, checking the compatibility between Web services to guarantee that they can interact correctly is a main step in the verification process. This type of checking is based on the services descriptions. Enriching services descriptions by including their behaviours is becoming more and more important. This behaviour can be described by business protocols representing the possible sequences of message exchanges. Since a lot of Web services use access control policies to restrict the access to authorized consumers, these policies should be a part of the service description. Selecting compatible Web services for implementing service choreography is the main contribution of this work. This is achieved by modeling and checking the compatibility between Web services by analyzing their business protocols after assigning the access control policies which will be presented using an ontology.
引用
收藏
页码:235 / 240
页数:6
相关论文
共 50 条
[41]   A multi-level approach for selecting and recommending semantic web services [J].
Latrache, Amal ;
Nfaoui, El Habib .
PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2017), 2017,
[42]   A Petri Net Approach to Analyzing Behavioral Compatibility and Similarity of Web Services [J].
Li, Xitong ;
Fan, Yushun ;
Sheng, Quan Z. ;
Maamar, Zakaria ;
Zhu, Hongwei .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2011, 41 (03) :510-521
[43]   Secure communication and access control for web services container [J].
Peng, Yu ;
Wu, Quanyuan .
GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, :412-+
[44]   Role-based access control for web services [J].
College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China .
WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558)
[45]   Action-Based Access Control for Web Services [J].
Li, Fenghua ;
Wang, Wei ;
Ma, Jianfeng ;
Su, Haoxin .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, :637-642
[46]   User tasks and access control over web services [J].
Thomas, Jacques ;
Paci, Federica ;
Bertino, Elisa ;
Eugster, Patrick .
2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, :60-+
[47]   An access control model for web services in business process [J].
Liu, P ;
Chen, Z .
IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2004), PROCEEDINGS, 2004, :292-298
[48]   Web services access control architecture incorporating trust [J].
Coetzee, Marijke ;
Eloff, J. H. P. .
INTERNET RESEARCH, 2007, 17 (03) :291-305
[49]   A new method for consistency of access control in web services [J].
Bagheri, Esmaeil ;
Babaei, Saeid ;
Khayyambashi, Mohammad Reza .
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, :567-+
[50]   ACCONV - An Access Control Model for Conversational Web Services [J].
Paci, Federica ;
Mecella, Massimo ;
Ouzzani, Mourad ;
Bertino, Elisa .
ACM TRANSACTIONS ON THE WEB, 2011, 5 (03)