Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments

作者: Ning Xi , Jianfeng Ma , Cong Sun , Tao Zhang

DOI: 10.1109/ICWS.2013.81

关键词:

摘要: Dynamic service composition in wireless environment provides us with a promising approach to build complex applications based on the basic value-added services. In different network domains, multiple services may provide data security levels. order prevent from information leakage, flow is major concern composite However, energy-limited nature of user terminal mobile computing environments poses significant challenge for centralized verification where node need cost lots computation and resources. this paper, we specify constraints each participant secure chain lattice model, then present decentralized framework that cooperates participants complete process distributively respect their policies. Through experiments evaluations, results show it decreases single node.

参考文章(15)
E. Bertine, A.C. Squicciarini, D. Mevi, A fine-grained access control model for Web services ieee international conference on services computing. pp. 33- 40 ,(2004) , 10.1109/SCC.2004.1357987
Dieter Hutter, Melanie Volkamer, Information Flow Control to Secure Dynamic Web Service Composition Security in Pervasive Computing. pp. 196- 210 ,(2006) , 10.1007/11734666_15
Rafael Accorsi, Claus Wonnemann, Static Information Flow Analysis of Workflow Models. ISSS/BPSC. pp. 194- 205 ,(2010)
Hela Zorgati, Takoua Abdellatif, SEWSEC: A Secure Web Service Composer using Information Flow Control conference on risks and security of internet and systems. pp. 1- 8 ,(2011) , 10.1109/CRISIS.2011.6061842
Thomas R. Henderson, Sumit Roy, Sally Floyd, George F. Riley, ns-3 project goals Proceeding from the 2006 workshop on ns-2: the IP network simulator. pp. 13- ,(2006) , 10.1145/1190455.1190468
Dipanjan Chakraborty, Anupam Joshi, Tim Finin, Yelena Yesha, Service composition for mobile environments Mobile Networks and Applications. ,vol. 10, pp. 435- 451 ,(2005) , 10.1007/S11036-005-1556-Y
Gregor Snelting, Torsten Robschink, Jens Krinke, Efficient path conditions in dependence graphs for software safety analysis ACM Transactions on Software Engineering and Methodology. ,vol. 15, pp. 410- 457 ,(2006) , 10.1145/1178625.1178628
Christin Groba, Siobh´n Clarke, Opportunistic Composition of Sequentially-Connected Services in Mobile Computing Environments international conference on web services. pp. 17- 24 ,(2011) , 10.1109/ICWS.2011.56
Zhifeng Gu, Juanzi Li, Bin Xu, Automatic Service Composition Based on Enhanced Service Dependency Graph international conference on web services. pp. 246- 253 ,(2008) , 10.1109/ICWS.2008.68
Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino, Policy-Driven Service Composition with Information Flow Control international conference on web services. pp. 50- 57 ,(2010) , 10.1109/ICWS.2010.37