Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control

被引:0
|
作者
Elabd, Emad [1 ]
Coquery, Emmanuel [1 ]
Hacid, Mohand-Said [1 ]
机构
[1] Univ Claude Bernard Lyon 1, LIRIS CNRS UMR UFR Informat 5205, 43,Blvd 11 Novembre 1918, F-69622 Villeurbanne, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, Web services technologies are adequate for designing and implementing complex inter-enterprise business applications. Web services choreography defines the required behaviors of Web services which participate in implementing such applications with their interactions through message exchanges. The designer of the application collects the Web services that implement the defined choreography. The selected services must be compatible and perform the required operations of the application. Therefore, checking the compatibility between Web services to guarantee that they can interact correctly is a main step in the verification process. This type of checking is based on the services descriptions. Enriching services descriptions by including their behaviours is becoming more and more important. This behaviour can be described by business protocols representing the possible sequences of message exchanges. Since a lot of Web services use access control policies to restrict the access to authorized consumers, these policies should be a part of the service description. Selecting compatible Web services for implementing service choreography is the main contribution of this work. This is achieved by modeling and checking the compatibility between Web services by analyzing their business protocols after assigning the access control policies which will be presented using an ontology.
引用
收藏
页码:235 / 240
页数:6
相关论文
共 50 条
  • [41] A Petri Net Approach to Analyzing Behavioral Compatibility and Similarity of Web Services
    Li, Xitong
    Fan, Yushun
    Sheng, Quan Z.
    Maamar, Zakaria
    Zhu, Hongwei
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2011, 41 (03): : 510 - 521
  • [42] A multi-level approach for selecting and recommending semantic web services
    Latrache, Amal
    Nfaoui, El Habib
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2017), 2017,
  • [43] Role-based access control for web services
    College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China
    [J]. WSEAS Trans. Inf. Sci. Appl, 2006, 8 (1553-1558):
  • [44] Action-Based Access Control for Web Services
    Li, Fenghua
    Wang, Wei
    Ma, Jianfeng
    Su, Haoxin
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 637 - 642
  • [45] A platform independent access control metamodel for web services
    Simon, Balázs
    Goldschmidt, Balázs
    Kondorosi, Károly
    [J]. 1600, Budapest University of Technology and Economics (58): : 93 - 108
  • [46] Attributed based access control (ABAC) for web services
    Yuan, E
    Tong, J
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, PROCEEDINGS, 2005, : 561 - 569
  • [47] ACCONV - An Access Control Model for Conversational Web Services
    Paci, Federica
    Mecella, Massimo
    Ouzzani, Mourad
    Bertino, Elisa
    [J]. ACM TRANSACTIONS ON THE WEB, 2011, 5 (03)
  • [48] A new method for consistency of access control in web services
    Bagheri, Esmaeil
    Babaei, Saeid
    Khayyambashi, Mohammad Reza
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 567 - +
  • [49] An access control model for web services in business process
    Liu, P
    Chen, Z
    [J]. IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2004), PROCEEDINGS, 2004, : 292 - 298
  • [50] Web services access control architecture incorporating trust
    Coetzee, Marijke
    Eloff, J. H. P.
    [J]. INTERNET RESEARCH, 2007, 17 (03) : 291 - 305