A Method for Modeling and Analyzing the Security Attributes of Service-Oriented Software System

被引:0
|
作者
Liu Li [1 ]
Wang Chunlei [2 ]
Ming Liang [1 ]
机构
[1] Sci & Technol Informat Syst Secur Lab, Beijing, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
service oriented architecture; software security; security model; security analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Service Oriented Architecture (SOA), software is implemented through a series of services and the business processes composed of services which introduce potential security problems. These security problems appeared in SOA software applications usually lead information systems and their business processes to risks. Similar to traditional quality of service (QoS) attributes such as reliability and robustness, security is one of the most important attributes of software system. In this paper, the method for modeling and analyzing the security attributes of SOA software system is investigated. Firstly, the service oriented computing model for security analysis is constructed, which characterizes service computing paradigm and related security attributes, and can be used for establishing service oriented software security metric system. Secondly, the service attack path is analyzed based upon the service oriented computing model. Finally, the effectiveness of the model and the analysis method is validated through case studies.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Modeling and analyzing mixed communications in service-oriented trustworthy software
    Jiang JianMin
    Zhang Shi
    Gong Ping
    Hong Zhong
    Yue HouGuang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (12) : 2738 - 2756
  • [2] Modeling and analyzing mixed communications in service-oriented trustworthy software
    JIANG JianMin 1
    2 Department of Computer
    [J]. Science China(Information Sciences), 2012, 55 (12) : 2738 - 2756
  • [3] Modeling and analyzing mixed communications in service-oriented trustworthy software
    JianMin Jiang
    Shi Zhang
    Ping Gong
    Zhong Hong
    HouGuang Yue
    [J]. Science China Information Sciences, 2012, 55 : 2738 - 2756
  • [4] Service-Oriented Enterprise Cooperation: Modeling Method and System
    Lin, Huiping
    Liu, Sheng
    Fan, Yushun
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1032 - +
  • [5] Modeling and analysis of service interactions in service-oriented software
    Lee, WJ
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 1043 - 1050
  • [6] Modeling and simulation in service-oriented software development
    Tsai, W. T.
    Cao, Zhibin
    Wei, Xiao
    Paul, Ray
    Huang, Qian
    Sun, Xin
    [J]. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2007, 83 (01): : 7 - 32
  • [7] A security framework for developing service-oriented software architectures
    Rafe, Vahid
    Hosseinpouri, Ramin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 2957 - 2972
  • [8] Systematic security analysis for service-oriented software architectures
    Liu, Yanguo
    Traore, Issa
    [J]. ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 612 - 621
  • [9] A Security Process for the Automotive Service-Oriented Software Architecture
    Puellen, Dominik
    Frank, Florian
    Christl, Marion
    Liu, Wuhao
    Katzenbeisser, Stefan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (04) : 5036 - 5053
  • [10] A Service-oriented Framework for Quantitative Security Analysis of Software Architectures
    Liu, Yanguo
    Traore, Issa
    Hoole, Alexander M.
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1231 - 1238