IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Evaluation of Service-Oriented Systems Using the SiSOA Method

Security Evaluation of Service-Oriented Systems Using the SiSOA Method
View Sample PDF
Author(s): Christian Jung (Fraunhofer Institute for Experimental Software Engineering, Germany), Manuel Rudolph (Fraunhofer Institute for Experimental Software Engineering, Germany)and Reinhard Schwarz (Fraunhofer Institute for Experimental Software Engineering, Germany)
Copyright: 2011
Volume: 2
Issue: 4
Pages: 15
Source title: International Journal of Secure Software Engineering (IJSSE)
Editor(s)-in-Chief: Martin Gilje Jaatun (SINTEF Digital, Norway)
DOI: 10.4018/jsse.2011100102

Purchase

View Security Evaluation of Service-Oriented Systems Using the SiSOA Method on the publisher's website for pricing and purchasing information.

Abstract

The Service-Oriented Architecture paradigm (SOA) is commonly applied for the implementation of complex, distributed business processes. The service-oriented approach promises higher flexibility, interoperability and reusability of the IT infrastructure. However, evaluating the quality attribute security of such complex SOA configurations is not sufficiently mastered yet. To tackle this complex problem, the authors developed a method for evaluating the security of existing service-oriented systems on the architectural level. The method is based on recovering security-relevant facts about the system by using reverse engineering techniques and subsequently providing automated support for further interactive security analysis at the structural level. By using generic, system-independent indicators and a knowledge base, the method is not limited to a specific programming language or technology. Therefore, the method can be applied to various systems and adapt it to specific evaluation needs. The paper describes the general structure of the method, the knowledge base, and presents an instantiation aligned to the Service Component Architecture (SCA) specification.

Related Content

Mengdi Gao, Chenyu Hu. © 2025. 23 pages.
Xuechao Liu, Zhijian Zhang, Yikang Yang. © 2025. 20 pages.
Ming Li, Mohd Isa Rohayati. © 2025. 24 pages.
Yuemin Gao, Wei Wang, Wenqiang Dai, Qiongyao Liu, Guoxin Li. © 2025. 19 pages.
Jingli Zhang, XueYing Shi, Yingying Tang. © 2025. 23 pages.
Yikang Chen. © 2025. 15 pages.
Feifei Jiang, Chenghu Ke, Chenchen Zhong, Xiaoling Zhang. © 2025. 17 pages.
Body Bottom