A Heuristic Approach for Secure Service Composition Adaptation

Authors: 
Bo Zhou
David Llewellyn-Jones
David Lamb
Muhammad Asim
Qi Shi and Madjid Merabti
Book title - Journal: 
The First International Workshop on Cyberpatterns 2012
Year: 
2012

Secure adaptation of service composition is crucial for service-oriented applications. An effective adaptation method must improve a composition’s adherence to specified behaviour, performance and security guarantees at reasonable cost in terms of computing complexity and time consuming. This paper briefly discusses current techniques that have been developed to help achieve secure service composition. Based on security verification results, which have been categorised into four patterns, a simple heuristics-based adaptation strategy is proposed. In order to verify and extend this strategy into a practical approach, there is also a brief description of methodology used 

ANIKETOS newsletter

Stay informed on our latest news!

Login

Only for users who has an user and a password sent by the administrator.