Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1180367.1180376acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Automatic web services composition in trustaware communities

Published: 03 November 2006 Publication History

Abstract

The promise ofWeb Service Computing is to utilizeWeb services as fundamental elements for realizing distributed applications/solutions. In particular, when no available service can satisfy client request, (parts of) available services can be composed and orchestrated in order to satisfy such a request. In this paper, we address the automatic composition when component services have access control & authorization constraints, and impose further reputation constraints on other component services. In particular, access & authorization control is based on credentials, component services may (or not) trust of credentials issued by other component services and the service behavior is modeled by the possible conversations the service can have with its clients. We propose an automatic composition synthesis technique, based on reduction to satisfiability in Propositional Dynamic Logic, that is sound, complete and decidable. Moreover, we will characterize the computational complexity of the problem.

References

[1]
S. Agarwal, B. Sprick, and S. Wortmann. Credential Based Access Control for Semantic Web Services. In AAAI Spring Symposium Series, 2004.
[2]
G. Alonso, F. Casati, H. Kuno, and V. Machiraju. Web Services. Concepts, Architectures and Applications. Springer, 2004.
[3]
C. Ardagna, E. Damiani, S. De Capitani di Vimercati, and P. Samarati. A Web Service Architecture for Enforcing Access Control Policies. In Proceedings of 1st International Workshop on Views on Designing Complex Architectures, 2004.
[4]
R. Ashri, G. Denker, D. Marvin, M. Surridge, and T. Payne. Semantic Web Service Interaction Protocols: An Ontological Approach. In Proc. 3rd Internation Semantic Web Conference (ISWC 2004), 2004.
[5]
R. Ashri, T. Payne, D. Marvin, M. Surridge, and S. Taylor. Towards a Semantic Web Security Infrastructure. In Proc. Semantic Web Services 2004 Spring Symposium Series, 2004.
[6]
B. Benatallah, F. Casati, and F. Toumani. Web Service Conversation Modeling: A Cornerstone for e-Business Automation. IEEE Internet Computing, 8(1):46--54, 2004.
[7]
D. Berardi, D. Calvanese, G. De Giacomo, M. Lenzerini, and M. Mecella. Synthesis of Underspecified Composite e-Services based on Automated Reasoning. In Proc. of ICSOC 2004.
[8]
D. Berardi, D. Calvanese, G. De Giacomo, and M. Mecella. Automatic Web Service Composition: Service-tailored vs. Client-tailored Approaches. In Proc. AISC 2006, International Workshop jointly with ECAI 2006.
[9]
D. Berardi, D. Calvanese, G. De Giacomo, and M. Mecella. Automatic Composition of Web Services with Nondeterministic Behavior. Technical Report TR-05-2006, Univ. Roma LA SAPIENZA, Dipartimento di Informatica e Sistemistica, 2006. Extended abstracts/short papers in Proc. ICSOC 2005 and in Proc. ICWS 2006.
[10]
D. Berardi, D. Calvanese, G.D. Giacomo, M. Lenzerini, and M. Mecella. Automatic Service Composition based on Behavioral Descriptions. International Journal of Cooperative Information Systems, 14(4):333--376, 2005.
[11]
E. Bertino, L. Martino, F. Paci, and A. Squicciarini. An Adaptive Access Control Model for Web Services. To appear on International Journal of Web Services Research (JWSR), 2006.
[12]
E. Bertino and R. Sandhu. Database Security - Concepts, Approaches and Challenges. IEEE, 2005.
[13]
J. Blythe and J. Ambite, editors. Proc. ICAPS 2004 Workshop on Planning and Scheduling for Web and Grid Services, 2004.
[14]
T. Bultan, X. Fu, R. Hull, and J. Su. Conversation Specification: A New Approach to Design and Analysis of E-Service Composition. In Proc. of WWW 2003.
[15]
G. Denker, L. Kagal, T. Finin, M. Paolucci, and K. Sycara. Security for DAML Web Services: Annotation and Matchmaking. In Proc. of the 2nd Internationl Semantic Web Conference (ISWC 2003), 2003.
[16]
C. Gerede, R. Hull, O.H. Ibarra, and J. Su. Automated Composition of E-Services: Lookaheads. In Proc. ICSOC 2004.
[17]
D. Harel, D. Kozen, and J. Tiuryn. Dynamic Logic. The MIT Press, 2000.
[18]
R. Hull, M. Benedikt, V. Christophides, and J. Su. E-Services: a Look Behind the Curtain. In Proc. of PODS 2003, pages 1--14, 2003.
[19]
L. Kagal, M. Paolucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara. Authorization and Privacy for Semantic Web Services. IEEE Intelligent Systems, July/August, 2004.
[20]
S. McIlraith and T. Son. Adapting Golog for Composition of Semantic Web Services. In Proc. KR 2002.
[21]
M. Mecella, M. Ouzzani, F. Paci, and E. Bertino. Access Control Enforcement for Conversation-based Web Services. In Proc. of the 15th International World Wide Web Conference, Edinburgh, UK, May 2006.
[22]
M. Michalowski, J. Ambite, S. Thakkar, R. Tuchinda, C. Knoblock, and S. Minton. Retrieving and Semantically Integrating Heterogeneous Data from the Web. IEEE Intelligent Systems, 19(3):72--79, 2004.
[23]
A. Muscholl and I. Walukiewicz. A Lower Bound on Web Services Composition. Submitted, 2006.
[24]
S. Paurobally and N.R. Jennings. Protocol Engineering for Web Services Conversations. Engineering Applications of Artificial Intelligence, 18, 2005.
[25]
M. Pistore, A. Marconi, P. Bertoli, and P. Traverso. Automated Composition of Web Services by Planning at the Knowledge Level. In Proc. of IJCAI 2005, 2005.
[26]
M. Pistore, P. Traverso, P. Bertoli, and A. Marconi. Automated Synthesis of Composite BPEL4WS Web Services. In Proc. of ICWS 2005, 2005.
[27]
K.E. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. In Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA, 2001.
[28]
E. Sirer and K. Wang. An Access Control Language for Web Services. In Proc. ACM SACMAT, 2002.
[29]
P. Traverso and M. Pistore. Automated Composition of Semantic Web Services into Executable Processes. In Proc. ISWC 2004.
[30]
R. Wonohoesodo and Z. Tari. A Role based Access Control for Web Services. In Proc. SCC 2004, 2004.
[31]
D. Wu, B. Parsia, E. Sirin, J. Hendler, and D. Nau. Automating DAML-S Web Services Composition using SHOP2. In Proc.ISWC 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SWS '06: Proceedings of the 3rd ACM workshop on Secure web services
November 2006
120 pages
ISBN:1595935460
DOI:10.1145/1180367
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. composition
  3. trust
  4. web services

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Web Services Composition ProblemIT Policy and Ethics10.4018/978-1-4666-2919-6.ch063(1400-1424)Online publication date: 2013
  • (2013)Automated Service Composition Based on Behaviors: The Roman ModelWeb Services Foundations10.1007/978-1-4614-7518-7_8(189-214)Online publication date: 4-Sep-2013
  • (2013)Reputation‐based Web service orchestration in cloud computing: A surveyConcurrency and Computation: Practice and Experience10.1002/cpe.317727:9(2390-2412)Online publication date: 22-Nov-2013
  • (2011)Web Services Composition ProblemEngineering Reliable Service Oriented Architecture10.4018/978-1-60960-493-6.ch009(175-198)Online publication date: 2011
  • (2010)Checking Compatibility and Replaceability in Web Services Business Protocols with Access ControlProceedings of the 2010 IEEE International Conference on Web Services10.1109/ICWS.2010.102(409-416)Online publication date: 5-Jul-2010
  • (2010)Service Composition and Optimal Selection with Trust ConstraintsProceedings of the 2010 IEEE Asia-Pacific Services Computing Conference10.1109/APSCC.2010.45(645-653)Online publication date: 6-Dec-2010
  • (2009)Algorithms and Complexity of Automata Synthesis by Asynhcronous Orchestration With Applications to Web Services CompositionElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/j.entcs.2009.06.036229:3(3-18)Online publication date: 1-Jul-2009

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media