An Ontology for run-time Verification of Security Certificates for SOA

被引:1
|
作者
D'Agostini, Stefania [1 ]
Di Giacomo, Valentina [1 ]
Pandolfo, Claudia [1 ]
Presenza, Domenico [1 ]
机构
[1] Engn Ingn Informat SpA, Res & Dev Lab, Rome, Italy
关键词
Ontologies for security certification; Service Oriented Architecture (SOA); Service Certification; Service Security; Run-time verification; Semantic Security Certificates;
D O I
10.1109/ARES.2012.49
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software systems are often certified to guarantee they satisfy particular functional or non-functional requirements, including safety, security or privacy. In this paper, we propose an approach based on the use of ontologies to support the description of the content of security certificates for services. The work frames in the scope of the ASSERT4SOA project, which investigates the way to dynamically search for services satisfying certain security requirements. The ASSERT4SOA Ontology, the main result of this work, supports the interoperability and comparison of heterogeneous certificates and the run-time verification of the compliance of services with the security requirements asserted in their certificates.
引用
收藏
页码:525 / 533
页数:9
相关论文
共 50 条
  • [41] SoK: Run-time security for cloud microservices. Are we there yet?
    Minna, Francesco
    Massacci, Fabio
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [42] A Methodology to build run-time Monitors for Security-Aware Workflows
    Bertolissi, Clara
    Ranise, Silvio
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 501 - +
  • [43] Run-Time Security and Safety Management in Adaptive Smart Work Environments
    Teimourikia, Mahsa
    Fugini, Mariagrazia
    Raibulet, Claudia
    [J]. 2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 256 - 261
  • [44] Towards Security Case Run-time Adaptation by System Decomposition into Services
    Lisova, Elena
    Causevic, Aida
    [J]. IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 4102 - 4108
  • [45] Detect Compiler Inserted Run-time Security Checks in Binary Software
    Pramanick, Koyel
    Kulkarni, Prasad A.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 268 - 286
  • [46] A run-time verification method with consideration of uncertainties for cyber-physical systems
    Mehrabian, Mohammadreza
    Khayatian, Mohammad
    Shrivastava, Aviral
    Derler, Patricia
    Andrade, Hugo
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2023, 101
  • [47] AC-contract: Run-time verification of context-aware applications
    Mongiello, Marina
    Pelliccione, Patrizio
    Sciancalepore, Massimo
    [J]. 2015 IEEE/ACM 10TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS, 2015, : 24 - 34
  • [48] Statistical Run-Time Verification of Analog Circuits in Presence of Noise and Process Variation
    Narayanan, Rajeev
    Seghaier, Ibtissem
    Zaki, Mohamed H.
    Tahar, Sofiene
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2013, 21 (10) : 1811 - 1822
  • [49] Architectural design, behavior modeling and run-time verification of network embedded systems
    Shing, Man-Tak
    Drusinsky, Doron
    [J]. RELIABLE SYSTEMS ON UNRELIABLE NETWORKED PLATFORMS, 2007, 4322 : 281 - 303
  • [50] Behavioral modeling and run-time verification of system-of-systems architectural requirements
    Drusinsky, D
    Michael, JB
    Shing, MT
    [J]. INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 6, POST-CONFERENCE ISSUE, PROCEEDINGS, 2004, : 13 - 18