首页 | 官方网站   微博 | 高级检索  
     


Modelling,validating, and ranking of secure service compositions
Authors:Achim D Brucker  Bo Zhou  Francesco Malmignati  Qi Shi  Madjid Merabti
Affiliation:1. The University of Sheffield, Sheffield, United Kingdom;2. Liverpool John Moores University, Liverpool, United Kingdom;3. Selex ES S.p.A, A Finmeccanica Company, Italy;4. College of Sciences, University of Sharjah, Sharjah, UAE
Abstract:In the world of large‐scale applications, software as a service (SaaS) in general and use of microservices, in particular, is bringing service‐oriented architectures to a new level: Systems in general and systems that interact with human users (eg, sociotechnical systems) in particular are built by composing microservices that are developed independently and operated by different parties. At the same time, SaaS applications are used more and more widely by enterprises as well as public services for providing critical services, including those processing security or privacy of relevant data. Therefore, providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions. Building such service compositions securely is still an unsolved problem. In this paper, we present a framework for modelling, validating, and ranking secure service compositions that integrate both automated services as well as services that interact with humans. As a unique feature, our approach for ranking services integrates validated properties (eg, based on the result of formally analysing the source code of a service implementation) as well as contractual properties that are part of the service level agreement and, thus, not necessarily ensured on a technical level.
Keywords:human‐centred service compositions  SecureBPMN  secure service composition  service availability  service deployment  service ranking  Service design  service modelling
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号