IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Evaluation of Service-Oriented Systems Using the SiSOA Method

Security Evaluation of Service-Oriented Systems Using the SiSOA Method
View Sample PDF
Author(s): Christian Jung (Fraunhofer Institute for Experimental Software Engineering, Germany), Manuel Rudolph (Fraunhofer Institute for Experimental Software Engineering, Germany)and Reinhard Schwarz (Fraunhofer Institute for Experimental Software Engineering, Germany)
Copyright: 2013
Pages: 16
Source title: Developing and Evaluating Security-Aware Software Systems
Source Author(s)/Editor(s): Khaled M. Khan (Qatar University, Qatar)
DOI: 10.4018/978-1-4666-2482-5.ch002

Purchase

View Security Evaluation of Service-Oriented Systems Using the SiSOA Method on the publisher's website for pricing and purchasing information.

Abstract

The Service-Oriented Architecture paradigm (SOA) is commonly applied for the implementation of complex, distributed business processes. The service-oriented approach promises higher flexibility, interoperability and reusability of the IT infrastructure. However, evaluating the quality attribute security of such complex SOA configurations is not sufficiently mastered yet. To tackle this complex problem, the authors developed a method for evaluating the security of existing service-oriented systems on the architectural level. The method is based on recovering security-relevant facts about the system by using reverse engineering techniques and subsequently providing automated support for further interactive security analysis at the structural level. By using generic, system-independent indicators and a knowledge base, the method is not limited to a specific programming language or technology. Therefore, the method can be applied to various systems and adapt it to specific evaluation needs. The paper describes the general structure of the method, the knowledge base, and presents an instantiation aligned to the Service Component Architecture (SCA) specification.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom