Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Pino L.; Spanoudakis G. (2012)
Publisher: IEEE
Languages: English
Types: Article
Subjects: QA75
In service based systems, there is often a need to replace services at runtime as they become either unavailable or they no longer meet required quality or security properties. In such cases, it is often necessary to build compositions of services that can replace a problematic service because no single service with a sufficient match to it can be located. In this paper, we present an approach for building compositions of services that can preserve required security properties. Our approach is based on the use of secure composition patterns which are applied in connection with basic discovery mechanisms to build secure service compositions.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] A. Zisman, K. Mahbub and G. Spanoudakis, “A service discovery framework based on linear composition,” in Proc. IEEE Int. Service Computing Conference (SCC 2007), pp.536-543, 2007
    • [2] F. Lécué, E. Silva and L. F. Pires, “A framework for dynamic web services composition,” in Proc. 2nd ECOWS Work. on Emerging Web Services Technology (WEWST07), 2007.
    • [3] W. M. P. Van Der Aalst et al., “Workflow patterns,” Distrib. Parallel Databases 12(1): 5-51, 2003.
    • [4] ASSERT4SOA Project, “D5.1- Formal models and model composition,” 2011.
    • [5] J. McCarthy and P. Hayes, “Some philosophical problems from the standpoint of artificial intelligence,” in B. Meltzer and D. Michie, editors, Machine Intelligence, 4:463-502, 1969.
    • [6] M. Deubler, J. Grünbauer, J. Jürjens and G. Wimmel, “Sound development of secure service-based systems,” in Proc. of the 2nd Int. Conf. on Service oriented computing (ICSOC '04), pp. 115-124, 2004.
    • [7] Jing Dong, Tu Peng and Yajing Zhao, “Automated verification of security pattern compositions,” Inf. Softw. Techn. 52(3):274- 295, 2010.
    • [8] M. Bartoletti, P. Degano and G. L. Ferrari, “Enforcing secure service composition,” 18th Work. on Computer Security Foundations, 2005.
    • [9] M. Lelarge, Z. Liu and A. Riabov, “Automatic composition of secure workflows,” in Proc. of ATC'2006, 2006.
    • [10] B. Carminati, et al., “Security conscious web service composition,” in Proc. of the Int. Conf. on Web Services (ICWS), 2006.
    • [11] OASIS. SAML 1.0 Specification Set [Online]. Available: http://saml.xml.org/saml-specifications, 2002.
    • [12] Keita Fujii and Tatsuya Suda, “Semantics-based dynamic web service composition,” IEEE Journal on Selected Areas in Communications, 23(12): 2361- 2372, Dec. 2005.
    • [13] B. Medjahed, A. Bouguettaya and A. K. Elmagarmid, “Composing web services on the semantic web,” The VLDB Journal,12(4):333-351, 2003.
    • [14] M. C. Jaeger, G. Rojec-Goldmann and G. Muhl, “QoS aggregation for web service composition using workflow patterns,” in Proc. of the 8th Int. Conf. on Enterprise Distributed Object Computing, 2004.
    • [15] Aniketos Consortium, “D3.1 - Design-time support techniques for secure composition and adaptation,” [Online]. Available: http://www.aniketos.eu/, 2011.
    • [16] M. Bezzi, A. Sabetta, Spanoudakis G. “An architecture for certificationaware service discovery, ” 1st Int. Work. on Securing Services on the Cloud, 2011
    • [17] A. Zisman, G. Spanoudakis, J. Dooley. “A framework for dynamic service discovery”, In Proc. of 23rd Int. ACM/IEEE Conf. on Automated Software Engineering, 2008
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Published in

Funded by projects


Cite this article