Behavioral Attestation for Web Services Based Business Processes
Author:
Alam Masoom1, Nauman Mohammad1, Zhang Xinwen2, Ali Tamleek1, Hung Patrick C. K.3, Alam Quratulain1
Affiliation:
1. Institute of Management Sciences, Pakistan 2. Samsung Information Systems America, USA 3. University of Ontario Institute of Technology, Canada
Abstract
Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for such inter-organizational workflows is the establishment of trustworthiness, which is mostly achieved through non-technical measures, such as legislation, and/or social consent that businesses or organizations pledge themselves to adhere. A business process can only be trustworthy if the behavior of all services in it is trustworthy. Trusted Computing Group (TCG) has defined an open set of specifications for the establishment of trustworthiness through a hardware root-of-trust. This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. Secondly, to overcome the inherent weaknesses of trust management through software alone, a hardware root of-trust devised by the TCG, is used for the measurement of the behavior of individual services in a business process. Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.
Subject
Computer Networks and Communications,Information Systems,Software
Reference32 articles.
1. Alam, M., Seifert, J., & Zhang, X. (2007). A model-driven framework for trusted computing based systems. 2. Alam, M., Zhang, X., Nauman, M., & Ali, T. (2008). Behavioral attestation for web services (BA4WS). 3. Alam, M., Zhang, X., Nauman, M., Ali, T., & Seifert, J. (2008). Model-based behavioral attestation. 4. Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della-Libera, G., Dixon, B., et al. (2002). Web Services Trust Language (WS-Trust). Public draft release, Actional Corporation, BEA Systems, Computer Associates International, International Business Machines Corporation, Layer, 7. 5. Securing XML documents with Author-X
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|