Skip to Main content Skip to Navigation
New interface
Conference papers

Orchestration under Security Constraints

Yannick Chevalier 1, 2 Mohammed Anis Mekki 3 Michael Rusinowitch 3 
1 IRIT-LILaC - Logique, Interaction, Langue et Calcul
IRIT - Institut de recherche en informatique de Toulouse
3 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of services and a goal service, we reduce the problem of composing the goal from services in the community to a security problem where an intruder should intercept and redirect messages from the service community and a client service till reaching a satisfying state. We have implemented the algorithm in AVANTSSAR Platform and applied the tool to several case studies.
Document type :
Conference papers
Complete list of metadata

Cited literature [18 references]  Display  Hide  Download
Contributor : Michaël Rusinowitch Connect in order to contact the contributor
Submitted on : Thursday, December 1, 2011 - 10:55:41 AM
Last modification on : Monday, July 4, 2022 - 8:38:19 AM
Long-term archiving on: : Friday, November 16, 2012 - 12:36:05 PM


Files produced by the author(s)


  • HAL Id : hal-00642855, version 1


Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch. Orchestration under Security Constraints. Formal Methods for Components and Objects (FMCO 2010), Nov 2010, Graz, Austria. ⟨hal-00642855⟩



Record views


Files downloads