Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Tisa: Toward Trustworthy Services in a Service-Oriented Architecture

Published: 01 October 2008 Publication History

Abstract

Verifying whether a service implementation is conforming to its service-level agreements is important to inspire confidence in services in a service-oriented architecture (SoA). Functional agreements can be checked by observing the published interface of the service, but other agreements that are more non-functional in nature, are often verified by deploying a monitor that observes the execution of the service implementation. A problem is that such a monitor must execute in an untrusted environment. Thus, integrity of the results reported by such a monitor crucially depends on its integrity. We contribute an extension of the traditional SoA, based on hardware-based root of trust, that allows clients, brokers and providers to negotiate and validate the integrity of a requirements monitor executing in an untrusted environment. We make two basic claims: first, that it is feasible to realize our approach using existing hardware and software solutions, and second, that integrity verification can be done at a relatively small overhead. To evaluate feasibility, we have realized our approach using current software and hardware solutions. To measure overhead, we have conducted a case study using a collection of web service implementations available with Apache Axis implementation.

Cited By

View all
  • (2018)Declarative Web services composition using proofsService Oriented Computing and Applications10.1007/s11761-018-0234-412:3-4(371-389)Online publication date: 1-Dec-2018
  • (2015)Obfuscator-LLVMProceedings of the 1st International Workshop on Software Protection10.5555/2821429.2821434(3-9)Online publication date: 16-May-2015
  • (2010)Policy-based attestation of service behavior for establishing rigorous trustProceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I10.5555/1947725.1947749(240-255)Online publication date: 25-Oct-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Services Computing
IEEE Transactions on Services Computing  Volume 1, Issue 4
October 2008
56 pages

Publisher

IEEE Computer Society

United States

Publication History

Published: 01 October 2008

Author Tags

  1. Assertion checkers
  2. Domain-specific architectures
  3. Monitors
  4. Validation
  5. Verification
  6. assertion languages
  7. performance

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Declarative Web services composition using proofsService Oriented Computing and Applications10.1007/s11761-018-0234-412:3-4(371-389)Online publication date: 1-Dec-2018
  • (2015)Obfuscator-LLVMProceedings of the 1st International Workshop on Software Protection10.5555/2821429.2821434(3-9)Online publication date: 16-May-2015
  • (2010)Policy-based attestation of service behavior for establishing rigorous trustProceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I10.5555/1947725.1947749(240-255)Online publication date: 25-Oct-2010
  • (2010)Improving the trustworthiness of service QoS information in service-based systemsProceedings of the 7th international conference on Autonomic and trusted computing10.5555/1927943.1927962(208-218)Online publication date: 26-Oct-2010

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media