Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Data and Applications Security XIX
  3. Conference paper

Trading Off Security in a Service Oriented Architecture

  • Conference paper
  • pp 295–309
  • Cite this conference paper
Data and Applications Security XIX (DBSec 2005)
Trading Off Security in a Service Oriented Architecture
  • G. Swart17,
  • Benjamin Aziz18,
  • Simon N. Foley19 &
  • …
  • John Herbert19 

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3654))

Included in the following conference series:

  • IFIP Annual Conference on Data and Applications Security and Privacy
  • 1409 Accesses

  • 3 Citations

Abstract

Service oriented architectures provide a simple yet flexible model of a computing system as a graph of services making requests and providing results to each other. In this paper we define a formal model of a service oriented architecture and using it, we define metrics for performance, for availability, and for various security properties. These metrics serve as the basis for expressing the business requirements. To make trade-offs possible we also define a set of cost metrics, denominated in a uniform currency, to measure the cost of not meeting a requirement. The model, the property metrics, and the cost metrics are then used to generate a Constraint Satisfaction Problem where the objective function is set to minimize the aggregate system cost. We have written these constraints and defined realistic requirements in OPL and we have used them to generate system configurations that minimize the overall cost by optimally trading off the business requirements.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Inspecting Software Architecture Design Styles to Infer Threat Models and Inform Likely Attacks

Chapter © 2024

A Security Framework for Service-Oriented Architecture Based on Kerberos

Chapter © 2019

Architectures

Chapter © 2020

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Enterprise Architecture
  • Information Model
  • Principles and Models of Security
  • Security Services
  • Standards
  • Utilitarianism
  • QoS-Aware Web Service Composition Techniques

References

  1. Graham, S.L., Kessler, P.B., McKusick, M.K.: gprof: A call graph execution profiler. In: Thomas, W. (ed.) Proceedings of the SIGPLAN 1982 Symposium on Compiler Construction, Boston, MA, USA. SIGPLAN Notices, vol. 17(6), pp. 120–126. ACM Press, New York (1982)

    Chapter  Google Scholar 

  2. Herrold, R.: Rpm package manager (2002), http://www.rpm.org

  3. Zwicky, E.D., Simon Cooper, D.B.C.: A Handbook of Process Algebra. 2nd edn. O’Reilly, Sebastopol (2000)

    Google Scholar 

  4. Aziz, B., Foley, S.N., Herbert, J., Swart, G.: Configuring storage area networks for mandatory security. In: Farkas, C., Samarati, P. (eds.) Proceedings of the 18th IFIP Annual Conference on Data and Applications Security, Sitges, Catalonia, Spain, pp. 357–370. Kluwer, Dordrecht (2004)

    Google Scholar 

  5. Al-Ali, R., Hafid, A., Rana, O., Walker, D.: An approach for qos adaptation in service-oriented grids. Concurrency Computation: Practice and Experience 16 (2004)

    Google Scholar 

  6. Alvarez, G.A., Borowsky, E., Go, S., Romer, T.H., Becker-Szendy, R., Golding, R.A., Merchant, A., Spasojevic, M., Veitch, A.C., Wilkes, J.: Minerva: an automated resource provisioning tool for large-scale storage systems. ACM Transactions on Computer-Systems 19 (2001)

    Google Scholar 

  7. Anderson, E., Hobbs, M., Keeton, K., Spence, S., Uysal, M., Veitch, A.C.: Hippodrome: Running circles around storage administration. In: Long, D.D.E. (ed.) Proceedings of the FAST 2002 Conference on File and Storage Technologies, Monterey, California, USA, pp. 175–188. USENIX (2002)

    Google Scholar 

  8. Goldsack, P., Guijarro, J., Lain, A., Mecheneau, G., Murray, P., Toft, P.: Smartfrog: Configuration and automatic ignition of distributed applications. In: Proceedings of the HP OpenView University Association 10th Workshop. University of Geneva, Switzerland (2003), http://www.smartfrog.org/papers/SmartFrog_Overview_HPOVA03.May.pdf

  9. Ward, J., O’Sullivan, M., Shahoumian, T., Wilkes, J.: Appia: automatic storage area network design. In: Long, D.D.E. (ed.) Proceedings of the FAST 2002 Conference on File and Storage Technologies, Monterey, California, USA, pp. 203–217. USENIX (2002)

    Google Scholar 

  10. Swart, G.: Storage management by constraint satisfaction. In: Proceedings of the Workshop on Immediate Applications of Constraint Programming, Kinsale, Cork, Ireland (2003)

    Google Scholar 

  11. Balter, R., Bellissard, L., Boyer, F., Rivelli, M., Vion-Dury, J.: Architecting and configuring distributed applications with olan. In: Proceedings of the 1998 IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing, The Lake district, UK. LNCS, vol. 1518, pp. 241–256. Springer, Heidelberg (1998)

    Google Scholar 

  12. Chen, S., Nahrstedt, K.: An overview of quality-of-service routing for the next generation high-speed networks: Problems and solutions. IEEE Network Magazine 12, 64–79 (1998)

    Article  Google Scholar 

  13. Martín-Díaz, O., Cortés, A.R., Durán, A., Benavides, D., Toro, M.: Automating the procurement of web services. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol. 2910, pp. 91–103. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. IBM Almaden Research Center, 650 Harry Road, San Jose, CA, USA

    G. Swart

  2. Department of Computing, Imperial College, London, SW7 2AZ, UK

    Benjamin Aziz

  3. Department of Computer Science, University College Cork, Cork, Ireland

    Simon N. Foley & John Herbert

Authors
  1. G. Swart
    View author publications

    Search author on:PubMed Google Scholar

  2. Benjamin Aziz
    View author publications

    Search author on:PubMed Google Scholar

  3. Simon N. Foley
    View author publications

    Search author on:PubMed Google Scholar

  4. John Herbert
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Center for Secure Information Systems, George Mason University, 22030, Fairfax, VA, USA

    Sushil Jajodia  & Duminda Wijesekera  & 

Rights and permissions

Reprints and permissions

Copyright information

© 2005 IFIP International Federation for Information Processing

About this paper

Cite this paper

Swart, G., Aziz, B., Foley, S.N., Herbert, J. (2005). Trading Off Security in a Service Oriented Architecture. In: Jajodia, S., Wijesekera, D. (eds) Data and Applications Security XIX. DBSec 2005. Lecture Notes in Computer Science, vol 3654. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11535706_22

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11535706_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28138-2

  • Online ISBN: 978-3-540-31937-5

  • eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Constraint Satisfaction Problem
  • Service Orient Architecture
  • Service Interface
  • Load Unit
  • Call Graph

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Footer Navigation

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover

Corporate Navigation

  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature