Providing security for Web Service Composition using Finite State Machine
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services. Our paper proposes a policy based system for granting security during the process of web service composition. Policies defined for effective and secure composition analyze and verify the conditions under which the task of the web service is allowed or rejected. To achieve this specification, we make use of Finite State Machine model which clearly portrays the business and flow logic. Nodes in the Finite State Machine represent rules. Upon efficacious fulfillment of policies which are defined in the node access points, transition between rules is stimulated. A service composition is said to be successfully incorporated only if there is complete absence of policy violations when combining the policies of elementary services. The simulated FSM which extracts the rules and policies of the web services and correctly matches and satisfies the policy constraints defined in the access points ensure providing security for the composite web service.
Authors and Affiliations
Priya Sundar, R Raju, P Mahalakshmi, G Lalitha
Genetic algorithm based approach to solve travelling salesman problem with one point crossover operator:
In this paper, the travelling salesman problem using genetic algorithm has been attempted. In this practical paper solution is easy and we can easily apply genetic operator in this type of problem. Complexity is both in...
Performance Analysis and Evaluation of Hybrid Network using different Integrated Routing Protocols
The increasing demand of computer communication networks are growing rapidly day by day. With the growing need to distribute applications across multiple networks and the availability of high capacity, high-performance i...
Improved PageRank Algorithm for Web Structure Mining
The growth of internet is increasing continuously by which the need for improving the quality of services has been increased. Web mining is a research area which applies data mining techniques to address all this need. W...
VEHICLE ROUTING PROBLEM WITH TIME WINDOWS USING HYBRID ENCODING GENETIC ALGORITHM
The vehicle routing problem is to determine K vehicle routes, where a route is a tour that begins at the depot, traverses a subset of the customers in a specified sequence and returns to the depot. Each customer must...
Analysing The Quality Attributes of AOP using CYVIS Tool
The aim of thesis is to provide the difference between AOP and OOP in AspectJ by using CYVIS tool. It gives a way to separate the code from essential crosscutting concerns, such as logging and security, from Java program...