Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1180367.1180376acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Automatic web services composition in trustaware communities

Published: 03 November 2006 Publication History
  • Get Citation Alerts
  • Abstract

    The promise ofWeb Service Computing is to utilizeWeb services as fundamental elements for realizing distributed applications/solutions. In particular, when no available service can satisfy client request, (parts of) available services can be composed and orchestrated in order to satisfy such a request. In this paper, we address the automatic composition when component services have access control & authorization constraints, and impose further reputation constraints on other component services. In particular, access & authorization control is based on credentials, component services may (or not) trust of credentials issued by other component services and the service behavior is modeled by the possible conversations the service can have with its clients. We propose an automatic composition synthesis technique, based on reduction to satisfiability in Propositional Dynamic Logic, that is sound, complete and decidable. Moreover, we will characterize the computational complexity of the problem.

    References

    [1]
    S. Agarwal, B. Sprick, and S. Wortmann. Credential Based Access Control for Semantic Web Services. In AAAI Spring Symposium Series, 2004.
    [2]
    G. Alonso, F. Casati, H. Kuno, and V. Machiraju. Web Services. Concepts, Architectures and Applications. Springer, 2004.
    [3]
    C. Ardagna, E. Damiani, S. De Capitani di Vimercati, and P. Samarati. A Web Service Architecture for Enforcing Access Control Policies. In Proceedings of 1st International Workshop on Views on Designing Complex Architectures, 2004.
    [4]
    R. Ashri, G. Denker, D. Marvin, M. Surridge, and T. Payne. Semantic Web Service Interaction Protocols: An Ontological Approach. In Proc. 3rd Internation Semantic Web Conference (ISWC 2004), 2004.
    [5]
    R. Ashri, T. Payne, D. Marvin, M. Surridge, and S. Taylor. Towards a Semantic Web Security Infrastructure. In Proc. Semantic Web Services 2004 Spring Symposium Series, 2004.
    [6]
    B. Benatallah, F. Casati, and F. Toumani. Web Service Conversation Modeling: A Cornerstone for e-Business Automation. IEEE Internet Computing, 8(1):46--54, 2004.
    [7]
    D. Berardi, D. Calvanese, G. De Giacomo, M. Lenzerini, and M. Mecella. Synthesis of Underspecified Composite e-Services based on Automated Reasoning. In Proc. of ICSOC 2004.
    [8]
    D. Berardi, D. Calvanese, G. De Giacomo, and M. Mecella. Automatic Web Service Composition: Service-tailored vs. Client-tailored Approaches. In Proc. AISC 2006, International Workshop jointly with ECAI 2006.
    [9]
    D. Berardi, D. Calvanese, G. De Giacomo, and M. Mecella. Automatic Composition of Web Services with Nondeterministic Behavior. Technical Report TR-05-2006, Univ. Roma LA SAPIENZA, Dipartimento di Informatica e Sistemistica, 2006. Extended abstracts/short papers in Proc. ICSOC 2005 and in Proc. ICWS 2006.
    [10]
    D. Berardi, D. Calvanese, G.D. Giacomo, M. Lenzerini, and M. Mecella. Automatic Service Composition based on Behavioral Descriptions. International Journal of Cooperative Information Systems, 14(4):333--376, 2005.
    [11]
    E. Bertino, L. Martino, F. Paci, and A. Squicciarini. An Adaptive Access Control Model for Web Services. To appear on International Journal of Web Services Research (JWSR), 2006.
    [12]
    E. Bertino and R. Sandhu. Database Security - Concepts, Approaches and Challenges. IEEE, 2005.
    [13]
    J. Blythe and J. Ambite, editors. Proc. ICAPS 2004 Workshop on Planning and Scheduling for Web and Grid Services, 2004.
    [14]
    T. Bultan, X. Fu, R. Hull, and J. Su. Conversation Specification: A New Approach to Design and Analysis of E-Service Composition. In Proc. of WWW 2003.
    [15]
    G. Denker, L. Kagal, T. Finin, M. Paolucci, and K. Sycara. Security for DAML Web Services: Annotation and Matchmaking. In Proc. of the 2nd Internationl Semantic Web Conference (ISWC 2003), 2003.
    [16]
    C. Gerede, R. Hull, O.H. Ibarra, and J. Su. Automated Composition of E-Services: Lookaheads. In Proc. ICSOC 2004.
    [17]
    D. Harel, D. Kozen, and J. Tiuryn. Dynamic Logic. The MIT Press, 2000.
    [18]
    R. Hull, M. Benedikt, V. Christophides, and J. Su. E-Services: a Look Behind the Curtain. In Proc. of PODS 2003, pages 1--14, 2003.
    [19]
    L. Kagal, M. Paolucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara. Authorization and Privacy for Semantic Web Services. IEEE Intelligent Systems, July/August, 2004.
    [20]
    S. McIlraith and T. Son. Adapting Golog for Composition of Semantic Web Services. In Proc. KR 2002.
    [21]
    M. Mecella, M. Ouzzani, F. Paci, and E. Bertino. Access Control Enforcement for Conversation-based Web Services. In Proc. of the 15th International World Wide Web Conference, Edinburgh, UK, May 2006.
    [22]
    M. Michalowski, J. Ambite, S. Thakkar, R. Tuchinda, C. Knoblock, and S. Minton. Retrieving and Semantically Integrating Heterogeneous Data from the Web. IEEE Intelligent Systems, 19(3):72--79, 2004.
    [23]
    A. Muscholl and I. Walukiewicz. A Lower Bound on Web Services Composition. Submitted, 2006.
    [24]
    S. Paurobally and N.R. Jennings. Protocol Engineering for Web Services Conversations. Engineering Applications of Artificial Intelligence, 18, 2005.
    [25]
    M. Pistore, A. Marconi, P. Bertoli, and P. Traverso. Automated Composition of Web Services by Planning at the Knowledge Level. In Proc. of IJCAI 2005, 2005.
    [26]
    M. Pistore, P. Traverso, P. Bertoli, and A. Marconi. Automated Synthesis of Composite BPEL4WS Web Services. In Proc. of ICWS 2005, 2005.
    [27]
    K.E. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. In Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA, 2001.
    [28]
    E. Sirer and K. Wang. An Access Control Language for Web Services. In Proc. ACM SACMAT, 2002.
    [29]
    P. Traverso and M. Pistore. Automated Composition of Semantic Web Services into Executable Processes. In Proc. ISWC 2004.
    [30]
    R. Wonohoesodo and Z. Tari. A Role based Access Control for Web Services. In Proc. SCC 2004, 2004.
    [31]
    D. Wu, B. Parsia, E. Sirin, J. Hendler, and D. Nau. Automating DAML-S Web Services Composition using SHOP2. In Proc.ISWC 2003.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SWS '06: Proceedings of the 3rd ACM workshop on Secure web services
    November 2006
    120 pages
    ISBN:1595935460
    DOI:10.1145/1180367
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access control
    2. composition
    3. trust
    4. web services

    Qualifiers

    • Article

    Conference

    CCS06
    Sponsor:

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to

    Other Metrics

    Citations

    Cited By

    View all
    • (2013)Web Services Composition ProblemIT Policy and Ethics10.4018/978-1-4666-2919-6.ch063(1400-1424)Online publication date: 2013
    • (2013)Automated Service Composition Based on Behaviors: The Roman ModelWeb Services Foundations10.1007/978-1-4614-7518-7_8(189-214)Online publication date: 4-Sep-2013
    • (2013)Reputation‐based Web service orchestration in cloud computing: A surveyConcurrency and Computation: Practice and Experience10.1002/cpe.317727:9(2390-2412)Online publication date: 22-Nov-2013
    • (2011)Web Services Composition ProblemEngineering Reliable Service Oriented Architecture10.4018/978-1-60960-493-6.ch009(175-198)Online publication date: 2011
    • (2010)Checking Compatibility and Replaceability in Web Services Business Protocols with Access ControlProceedings of the 2010 IEEE International Conference on Web Services10.1109/ICWS.2010.102(409-416)Online publication date: 5-Jul-2010
    • (2010)Service Composition and Optimal Selection with Trust ConstraintsProceedings of the 2010 IEEE Asia-Pacific Services Computing Conference10.1109/APSCC.2010.45(645-653)Online publication date: 6-Dec-2010
    • (2009)Algorithms and Complexity of Automata Synthesis by Asynhcronous Orchestration With Applications to Web Services CompositionElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/j.entcs.2009.06.036229:3(3-18)Online publication date: 1-Jul-2009

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media