Deriving Secure Network Protocols for Enterprise Services Architectures

被引:0
|
作者
Anlauff, Matthias [1 ]
Pavlovic, Dusko [1 ]
Suenbuel, Asuman [2 ]
机构
[1] Kestrel Inst, 3260 Hillview Ave, Palo Alto, CA 94304 USA
[2] SAP Res Labs, Palo Alto, CA 94304 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise Service Architectures are emerging as a promising way to compose Web-Services as defined by the W3C consortium, to form complex, enterprise level services. However, due to the fact that each Web-Service composition is also a protocol composition, this composition gets problematic, if security protocol mechanisms are used for the individual Web-Services, because security properties are not preserved under composition. This paper outlines the approach of protocol derivations that on the one hand mimics the general engineering practice when combining security features, but on the other hand avoids the problems that can arise during the composition of Web-Services by using well-founded mathematical concepts. The Protocol Derivation Assistant, a tool that supports this approach, is also introduced in this paper.
引用
收藏
页码:2283 / 2287
页数:5
相关论文
共 50 条
  • [1] Internet Future Architectures for Network and Media Independent Services and Protocols
    Alcober, Jesus
    Hesselbach, Xavier
    de la Oliva, Antonio
    Garcia-Saavedra, Andres
    Roldan, David
    Bock, Carlos
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON 2013), 2013,
  • [2] Deriving protocols for services supporting mobile users
    Kapus-Kolar, M
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2000, 42 (09) : 619 - 631
  • [3] INTRODUCTION TO NETWORK ARCHITECTURES AND PROTOCOLS
    GREEN, PE
    [J]. IBM SYSTEMS JOURNAL, 1979, 18 (02) : 202 - 222
  • [4] AN INTRODUCTION TO NETWORK ARCHITECTURES AND PROTOCOLS
    GREEN, PE
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (04) : 413 - 424
  • [5] Deriving optimal checkpoint protocols for distributed shared memory architectures
    Alvisi, L
    Marzullo, K
    [J]. THEORY AND PRACTICE IN DISTRIBUTED SYSTEMS, 1995, 938 : 111 - 120
  • [6] Scalable and Secure Internet Services and Architectures
    Zhou, Xiaobo
    [J]. INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2006, 21 (04) : 303 - 304
  • [7] Connector-based software development: Deriving secure protocols
    Pavlovic, Dusko
    [J]. FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 598 - 599
  • [8] SERVICES, ARCHITECTURES, AND PROTOCOLS FOR SPACE DATA SYSTEMS
    HELGERT, HJ
    [J]. PROCEEDINGS OF THE IEEE, 1991, 79 (09) : 1213 - 1231
  • [9] Exploration of Storage Architectures for Enterprise Network
    Hussain, Tahani H.
    Marimuthu, Paulvanna N.
    Habib, Sami J.
    [J]. COMPUTER JOURNAL, 2018, 61 (02): : 233 - 247
  • [10] Analysis of Network Protocols for Secure Communication
    Caballero, David
    Gonzalez, Francisco
    Islam, Sheikh Ariful
    [J]. 9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,