Providing security for Web Service Composition using Finite State Machine

DOI:

https://doi.org/10.24297/ijct.v4i2b1.3232

Keywords:

Composition System, Finite State Machine, Policy Manager, Web Service Composition, Quality Measurement Manager

Abstract

The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services. Our paper proposes a policy based system for granting security during the process of web service composition. Policies defined for effective and secure composition analyze and verify the conditions under which the task of the web service is allowed or rejected. To achieve this specification, we make use of Finite State Machine model which clearly portrays the business and flow logic. Nodes in the Finite State Machine represent rules. Upon efficacious fulfillment of policies which are defined in the node access points, transition between rules is stimulated. A service composition is said to be successfully incorporated only if there is complete absence of policy violations when combining the policies of elementary services. The simulated FSM which extracts the rules and policies of the web services and correctly matches and satisfies the policy constraints defined in the access points ensure providing security for the composite web service.

Downloads

Download data is not yet available.

Downloads

Published

2005-08-30

How to Cite

Providing security for Web Service Composition using Finite State Machine. (2005). INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 4(2), 435–444. https://doi.org/10.24297/ijct.v4i2b1.3232

Issue

Section

Research Articles