TY - GEN
T1 - Container-level security certification of services
AU - Anisetti, Marco
AU - Ardagna, Claudio A.
AU - Damiani, Ernesto
PY - 2012
Y1 - 2012
N2 - The increasing success of the Service-Oriented Architecture (SOA) paradigm has fostered the implementation of complex services, including business processes, via dynamic selection and composition of remote services providing single functionality. Run-time selection and composition of services require the deployment of high-level security standards for the SOA infrastructure, to increase the confidence of both service consumers and providers that the services satisfy their security requirements and behave as expected. In this context, certification can play a fundamental role and provide the evidence that a set of properties hold for a given service. Security certification of services can involve two different aspects: i) the evaluation of the container in which the service is deployed, in terms of compliance with web service security standards and policies; ii) the verification and validation of the service implementation. In this chapter, we focus on the first aspect and we propose an overview of container-level certification of services.
AB - The increasing success of the Service-Oriented Architecture (SOA) paradigm has fostered the implementation of complex services, including business processes, via dynamic selection and composition of remote services providing single functionality. Run-time selection and composition of services require the deployment of high-level security standards for the SOA infrastructure, to increase the confidence of both service consumers and providers that the services satisfy their security requirements and behave as expected. In this context, certification can play a fundamental role and provide the evidence that a set of properties hold for a given service. Security certification of services can involve two different aspects: i) the evaluation of the container in which the service is deployed, in terms of compliance with web service security standards and policies; ii) the verification and validation of the service implementation. In this chapter, we focus on the first aspect and we propose an overview of container-level certification of services.
UR - http://www.scopus.com/inward/record.url?scp=84866390935&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-32439-0_6
DO - 10.1007/978-3-642-32439-0_6
M3 - Conference contribution
AN - SCOPUS:84866390935
SN - 9783642324383
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 93
EP - 108
BT - Business System Management and Engineering
T2 - International Workshop on Business System Management and Engineering, BSME 2010
Y2 - 28 June 2010 through 28 June 2010
ER -