Security Policy Monitoring of Composite Services

  title={Security Policy Monitoring of Composite Services},
  author={Muhammad Asim and Artsiom Yautsiukhin and Achim D. Brucker and Brett Lempereur and Qi Shi},
  booktitle={Secure and Trustworthy Service Composition},
One important challenge the Aniketos platform has to address is the effective monitoring of services at runtime to ensure that services behave as promised. A service developer plays the role that is responsible for constructing service compositions and the service provider is responsible for offering them to consumers of the Aniketos platform. Typically, service consumers will have different needs and requirements; they have varying business goals and different expectations from a service, for… 
Security policy monitoring of BPMN‐based service compositions
This paper presents a novel framework for monitoring services at runtime and ensuring that services behave as they have promised, focusing on monitoring non‐functional properties that are specified within an agreed security contract.
Modelling, validating, and ranking of secure service compositions
In the world of large‐scale applications, software as a service (SaaS) in general and use of microservices, in particular, is bringing service‐oriented architectures to a new level and providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions.
Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems
A behavior-aware service access control mechanism using security policy monitoring for SOA system that can effectively monitor consumer's behaviors and make effective responses when malicious behaviors really occur in run time is proposed.


Smart monitors for composed services
This work investigates how to monitor dynamic service compositions with respect to contracts expressed via assertions on services with one based on late-binding and reflection and the other based on a standard assertion system.
Runtime monitoring Web services implemented in BPEL
The paper proposed a novel solution to the problem of monitoring Web services instances implemented in BPEL by introducing Monitor Broker into traditional Web services architecture to access Web service runtime state information and calculate the QoS(Quality of service)property values.
Run-Time Monitoring in Service-Oriented Architectures
Service discovery is based on matching the published service descriptions with the required service specifications provided by the user, and once an external service is discovered, it may be bound and invoked remotely.
Flexible Pattern Monitoring for WS-BPEL through Stateful Aspect Extension
A stateful aspect extension to WS-BPEL, as a solution to support flexible behavior pattern monitoring for composite Web services, where history-based pointcut specifies the pattern of interest within a range, while advice describes the associated action to manage the process if the specified pattern occurs.
The Inlined Reference Monitor Approach to Security Policy Enforcement
This dissertation supports the thesis that such Inlined Reference Monitors, or IRMs, offer many advantages and are a practical option in modern systems, and an IRM toolkit for Java is described in detail, using an imperative policy language that allows a security policy to be given in a single complete specification.
Integrating Security Aspects into Business Process Models
This paper presents a security modelling language, called SecureBPMN, that can easily be integrated into business process modelling languages and presents a common language for describing business process models together with their security and compliance requirements.
Business Process Model and Notation - BPMN
ConSpec - A Formal Language for Policy Specification
The Event Calculus Explained
  • M. Shanahan
  • Computer Science
    Artificial Intelligence Today
  • 1999
The event calculus is presented, a logic-based formalism for representing actions and their effects which reduces to monotonic predicate completion and is shown to apply to a variety of domains, including those featuring actions with indirect effects, actions with nondeterministic effects, concurrent actions, and continuous change.
Artificial Intelligence Today
It is concluded that the use of behavioural architectures, in the robotic sense, to virtual agents has implications for the whole style in which a virtual world is modelled.