作者
Amina Bourouis, Kais Klai, Nejib Ben Hadj-Alouane, Yamen El Touati
发表日期
2016/9/1
期刊
IEEE Transactions on Services Computing
卷号
10
期号
1
页码范围
66-79
出版商
IEEE
简介
Web service (WS) providers need to restrain access to private information when cooperating with business partners. This need is translated in practice by an abstraction phase where inner data is withheld from public view. However, just like hiding encryption keys is not enough to prove the secrecy of information in a communication protocol, this procedure cannot prove the goal of secrecy is attained. Security related literature has turned in the past couple of decades to a new, formal, security property, i.e., opacity, to both hide and prove the privacy of secrets. Following our previous work on the use of the Symbolic Observation Graph (SOG), on one hand, to abstract and compose Web services, and to verify the opacity of systems on the other, we show in this paper how the verification of three different types of opacity in SOG-abstracted WSs is translated to the opacity of their composites. We hence establish that the …
引用总数
2017201820192020202120222023202433533733
学术搜索中的文章
A Bourouis, K Klai, NB Hadj-Alouane, Y El Touati - IEEE Transactions on Services Computing, 2016