Secure adaptation of service composition is crucial for service-oriented applications. An effective adaptation method must improve a composition’s adherence to specified behaviour, performance and security guarantees at reasonable cost in terms of computing complexity and time consuming. This paper briefly discusses current techniques that have been developed to help achieve secure service composition. Based on security verification results, which have been categorised into four patterns, a simple heuristics-based adaptation strategy is proposed. In order to verify and extend this strategy into a practical approach, there is also a brief description of methodology used
Stay informed on our latest news!
Only for users who has an user and a password sent by the administrator.