Formal Certification and Compliance for Run-Time Service Environments

Article, Unknown, Part of book or chapter of book English OPEN
Foster, H. ; Spanoudakis, G. ; Mahbub, K. (2012)

With the increased awareness of security and safety of services in on-demand distributed service provisioning (such\ud as the recent adoption of Cloud infrastructures), certification and compliance checking of services is becoming a key element for service engineering. Existing certification techniques tend to support mainly design-time checking of service properties and tend not to support the run-time monitoring and progressive certification in the service execution environment. In this paper we discuss an approach which provides both design-time and runtime behavioural compliance checking for a services architecture, through enabling a progressive event-driven model-checking technique. Providing an integrated approach to certification and compliance is a challenge however using analysis and monitoring techniques we present such an approach for on-going compliance checking.
  • References (21)
    21 references, page 1 of 3

    [1] C. Hang, Y. Wang, and S. M.P., “Operators for propagating trust and their evaluation in social networks,” in 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). Budapest, Hungary: ACM, 2009.

    [2] L. Wilkes, “Policy driven practices for soa,” in presented at the CBDI SOA Seminar, 2006.

    [3] H. Foster, S. Uchitel, J. Magee, and J. Kramer, “An integrated workbench for model-based engineering of service compositions,” IEEE Transactions on Services Computing, vol. 3, pp. 131-144, 2010.

    [4] ASSERT4SOA, “Advanced security service certificate for soa,” in EU Project ICT-2009.1.4., Available from: http://assert4soa.eu/, 2009.

    [5] H. Foster and G. Spanoudakis, “Advanced service monitoring configurations with sla decomposition and selection,” in Proceedings of the 2011 ACM Symposium on Applied Computing, ser. SAC '11. New York, NY, USA: ACM, 2011, pp. 1582-1589. [Online]. Available: http://doi.acm.org/10.1145/1982185.1982519

    [6] R. Milner, Communication and Concurrency. NJ, USA.: Prentice-Hall Inc, 1989.

    [7] J. Magee, J. Kramer, and D. Giannakopoulou, “Analysing the behaviour of distributed software architectures: a case study,” in 5th IEEE Workshop on Future Trends of Distributed Computing Systems, Tunisia, 1997.

    [8] J. Magee and J. Kramer, Concurrency - State Models and Java Programs - 2nd Edition. John Wiley, 2006.

    [9] G. Spanoudakis and K. Mahbub, “Non intrusive monitoring of service based systems,” International Journal of Cooperative Information Systems, vol. 15, pp. 325-358, 2006.

    [10] G. Spanoudakis, C. Kloukinas, and K. Mahbub, “The serenity runtime monitoring framework,” Security and Dependability for Ambient Intelligence, Advances in Information Security Series, vol. 15, 2009.

  • Metrics
    No metrics available
Share - Bookmark