To main content

Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions

Abstract

This chapter studies not only how traditional threats may affect composite services, but also some of the new challenges that arise from the emerging Future Internet. For instance, while atomic services may, in isolation, comply with privacy requirements, a composition of the same services could lead to violations due to the combined information they manipulate. Furthermore, with volatile services and evolving laws and regulations, a composite service that seemed secure enough at deployment time, may find itself unacceptably compromised some time later. Our main contributions are a taxonomy of threats for composite services in the Future Internet, which organises thirty-two threats within seven categories, and a corresponding taxonomy of thirty-three countermeasures. These results have been devised from analysing service scenarios and their possible abuse with participants from seventeen organisations from industry and academia.

Category

Academic chapter/article/Conference paper

Language

English

Author(s)

  • Per Håkon Meland
  • Muhammad Asim
  • Dhouha Ayed
  • Fabiano Dalpiaz
  • Edith Félix
  • Paolo Giorgini
  • Susana Villa Gonzales
  • Brett Lempereur
  • John Ronan

Affiliation

  • SINTEF Digital / Software Engineering, Safety and Security
  • Liverpool John Moores University
  • Thalesgroup
  • Utrecht University
  • University of Trento
  • Atos
  • Waterford Institute of Technology

Year

2014

Publisher

Springer

Book

Secure and Trustworthy Service Composition. The Aniketos Approach

Issue

.

ISBN

978-3-319-13517-5

Page(s)

10 - 35

View this publication at Cristin