Providing security for Web Service Composition using Finite State Machine

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services. Our paper proposes a policy based system for granting security during the process of web service composition. Policies defined for effective and secure composition analyze and verify the conditions under which the task of the web service is allowed or rejected. To achieve this specification, we make use of Finite State Machine model which clearly portrays the business and flow logic. Nodes in the Finite State Machine represent rules. Upon efficacious fulfillment of policies which are defined in the node access points, transition between rules is stimulated. A service composition is said to be successfully incorporated only if there is complete absence of policy violations when combining the policies of elementary services. The simulated FSM which extracts the rules and policies of the web services and correctly matches and satisfies the policy constraints defined in the access points ensure providing security for the composite web service.

Authors and Affiliations

Priya Sundar, R Raju, P Mahalakshmi, G Lalitha

Keywords

Related Articles

Enhancing the Performance of the BackPropagation for Deep Neural Network

The standard Backpropagation Neural Network (BPNN) Algorithm is widely used in solving many real problems in world. But the backpropagation suffers from different difficulties such as the slow convergence and convergence...

EFFICIENT MANET- INTERNET INTEGRATION FOR MOBILE DEVICES

A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure support. The communication between these mobile nodes is carried out without any centralized control. The communicat...

Toward a Unified Ontology of Cloud Computing

The emergences of cloud computing deals in various internet applications developers for hosting various applications which users are in need in this day to day life.the idea is cloud ontology for easy Selection, Publicat...

Algorithm based on Histogram and Entropy for Edge Detection in Gray Level Images

Edge detection and feature extraction are widely used in image processing and computer vision applications. Most of the traditional methods for edge detection are based on the first and second order derivatives of gray l...

On the Theory of NP-Complete Problems

It is shown that the theory of NP -сomplete problems can't be used for the analysis of optimizing tasks.

Download PDF file
  • EP ID EP649996
  • DOI 10.24297/ijct.v4i2b1.3232
  • Views 75
  • Downloads 0

How To Cite

Priya Sundar, R Raju, P Mahalakshmi, G Lalitha (2013). Providing security for Web Service Composition using Finite State Machine. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 435-444. https://europub.co.uk/articles/-A-649996