Providing security for Web Service Composition using Finite State Machine

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services. Our paper proposes a policy based system for granting security during the process of web service composition. Policies defined for effective and secure composition analyze and verify the conditions under which the task of the web service is allowed or rejected. To achieve this specification, we make use of Finite State Machine model which clearly portrays the business and flow logic. Nodes in the Finite State Machine represent rules. Upon efficacious fulfillment of policies which are defined in the node access points, transition between rules is stimulated. A service composition is said to be successfully incorporated only if there is complete absence of policy violations when combining the policies of elementary services. The simulated FSM which extracts the rules and policies of the web services and correctly matches and satisfies the policy constraints defined in the access points ensure providing security for the composite web service.

Authors and Affiliations

Priya Sundar, R Raju, P Mahalakshmi, G Lalitha

Keywords

Related Articles

CUSTOMERS PERCEPTIONS OF MOBILE BANKING USING THE TECHNOLOGY ACCEPTANCE MODEL FOR SELECTED BANKING OUTLETS IN GAUTENG, SOUTH AFRICA

Much of the available literature that has examined the diffusion of mobile banking has tended to focus on the developed societies where these innovations had initially been introduced. As such, there is a paucity of stud...

To Control Electrical MCBs using Hand Gesture Recognition

There has been growing interest in development of new techniques and methods for Human-Computer Interaction (HCI). Gesture Recognition is one of the important areas of this technology. Gesture Recognition means interfaci...

ANALYSIS OF HUMAN FACE RECOGNITION ALGORITHM USING PCA+FDIT IN IMAGE DATABASE FOR CRIME INVESTIGATION

In general, the field of face recognition has lots of research that have put interest in order to detect the face and to identify it and also to track it. Many researchers have concentrated on the face identification and...

Analysis and Detection of Bot performing Keylogging Activities.

The focus on computer security has increased due to the ubiquitous use of Internet. Botnets are one of the biggest cyber threats. Botnet is a malware controlled by a Botmaster using Command and Control (C&C). Botnet...

A Collective Statistical Analysis of Outdoor Path Loss Models

This study encompasses nine path loss models (Erceg-Greenstein, Green-Obaidat, COST Hata, Hata Urban, Hata Rural, Hata Suburban, SUI, Egli and ECC-33) which were programmed on Python and studied for their results in an u...

Download PDF file
  • EP ID EP649996
  • DOI 10.24297/ijct.v4i2b1.3232
  • Views 64
  • Downloads 0

How To Cite

Priya Sundar, R Raju, P Mahalakshmi, G Lalitha (2013). Providing security for Web Service Composition using Finite State Machine. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 435-444. https://europub.co.uk/articles/-A-649996