Trading off security in a service oriented architecture

G. Swart*, Benjamin Aziz, Simon N. Foley, John Herbert

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Service oriented architectures provide a simple yet flexible model of a computing system as a graph of services making requests and providing results to each other. In this paper we define a formal model of a service oriented architecture and using it, we define metrics for performance, for availability, and for various security properties. These metrics serve as the basis for expressing the business requirements. To make trade-offs possible we also define a set of cost metrics, denominated in a uniform currency, to measure the cost of not meeting a requirement. The model, the property metrics, and the cost metrics are then used to generate a Constraint Satisfaction Problem where the objective function is set to minimize the aggregate system cost. We have written these constraints and defined realistic requirements in OPL and we have used them to generate system configurations that minimize the overall cost by optimally trading off the business requirements.

Original languageEnglish
Title of host publicationProceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
EditorsSushil Jajodia, Duminda Wijesekera
PublisherSpringer Nature
Pages295-309
Number of pages15
ISBN (Electronic)9783540319375
ISBN (Print)9783540281382
DOIs
Publication statusPublished - 19 Oct 2005
Event19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security - Storrs, United States
Duration: 7 Aug 200510 Aug 2005

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Verlag
Volume3654
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Country/TerritoryUnited States
CityStorrs
Period7/08/0510/08/05

Fingerprint

Dive into the research topics of 'Trading off security in a service oriented architecture'. Together they form a unique fingerprint.

Cite this