pdfreaders.org

Security Policy Monitoring of Composite Services

by Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, and Qi Shi

Cover for asim.ea:aniketos-monitoring:2014.One important challenge the Aniketos platform has to address is the effective monitoring of services at runtime to ensure that services behave as promised. A service developer plays the role that is responsible for constructing service compositions and the service provider is responsible for offering them to consumers of the Aniketos platform. Typically, service consumers will have different needs and requirements; they have varying business goals and different expectations from a service, for example in terms of functionality, quality of service and security needs. Given this, it is important to ensure that a service should deliver for which it has been selected and should match the consumer's expectations. If it fails, the system should take appropriate subsequent reactions, e.g., notifications to the service consumer or service designer. In this chapter, we present the policy-driven monitoring framework which is developed as part of the Aniketos project. The monitoring framework allows different user-specified policies to be monitored simultaneously. The monitor- ing is performed at the business level, as well as at the implementation level, which allows for checking the policies of composite services as well as atomic ones. The framework sends an alarm in case of policy violation to notify the interested parties and triggers re-composition or re-configuration of the service.

Keywords: monitoring, secure service composition, security policy, complex event processing, SOA, BPMN
Categories: ,
Documents: (full text as PDF file)

QR Code for asim.ea:aniketos-monitoring:2014.Please cite this article as follows:
Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, and Qi Shi. Security Policy Monitoring of Composite Services. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science: State of the Art Surveys (8900), pages 192-202, Springer-Verlag, 2014.
Keywords: monitoring, secure service composition, security policy, complex event processing, SOA, BPMN
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_13) (Share article on LinkedIn. Share article on CiteULike. )

BibTeX
@InCollection{ asim.ea:aniketos-monitoring:2014,
abstract = {One important challenge the Aniketos platform has to address is the effective monitoring of services at runtime to ensure that services behave as promised. A service developer plays the role that is responsible for constructing service compositions and the service provider is responsible for offering them to consumers of the Aniketos platform. Typically, service consumers will have different needs and requirements; they have varying business goals and different expectations from a service, for example in terms of functionality, quality of service and security needs. Given this, it is important to ensure that a service should deliver for which it has been selected and should match the consumer's expectations. If it fails, the system should take appropriate subsequent reactions, e.g., notifications to the service consumer or service designer. In this chapter, we present the policy-driven monitoring framework which is developed as part of the Aniketos project. The monitoring framework allows different user-specified policies to be monitored simultaneously. The monitor- ing is performed at the business level, as well as at the implementation level, which allows for checking the policies of composite services as well as atomic ones. The framework sends an alarm in case of policy violation to notify the interested parties and triggers re-composition or re-configuration of the service.},
address = {Heidelberg},
author = {Muhammad Asim and Artsiom Yautsiukhin and Achim D. Brucker and Brett Lempereur and Qi Shi},
booktitle = {Secure and Trustworthy Service Composition: The Aniketos Approach},
doi = {10.1007/978-3-319-13518-2_13},
editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden {Rios}},
isbn = {978-3-319-13517-5},
keywords = {monitoring, secure service composition, security policy, complex event processing, SOA, BPMN},
number = {8900},
pages = {192--202},
pdf = {https://www.brucker.ch/bibliography/download/2014/asim.ea-aniketos-monitoring-2014.pdf},
publisher = {Springer-Verlag},
series = {Lecture Notes in Computer Science: State of the Art Surveys},
title = {Security Policy Monitoring of Composite Services},
url = {https://www.brucker.ch/bibliography/abstract/asim.ea-aniketos-monitoring-2014},
year = {2014},
}