Skip to main content
  • Book
  • © 2014

Secure and Trustworthy Service Composition

The Aniketos Approach

  • State-of-the-art research
  • Presents the results of the Aniketos project, a comprehensive and integrated framework that supports security in composite services
  • Addresses practitioners, researchers, and students in computer and information security, software and security engineering

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8900)

Part of the book sub series: Security and Cryptology (LNSC)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 chapters)

  1. Front Matter

  2. State of the Art in Secure and Trustworthy Composite Services

    1. Composite Services with Dynamic Behaviour

      • Per Håkon Meland
      Pages 1-9
    2. Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions

      • Per Håkon Meland, Muhammad Asim, Dhouha Ayed, Fabiano Dalpiaz, Edith Félix, Paolo Giorgini et al.
      Pages 10-35
  3. The Aniketos Platform

    1. The Aniketos Platform

      • Per Håkon Meland, Erkuden Rios, Vasilis Tountopoulos, Achim D. Brucker
      Pages 50-62
    2. From Consumer Requirements to Policies in Secure Services

      • Erkuden Rios, Francesco Malmignati, Eider Iturbe, Michela D’Errico, Mattia Salnitri
      Pages 79-94
  4. Design-Time Support Framework

    1. Security Requirements Engineering with STS-Tool

      • Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, Paolo Giorgini
      Pages 95-109
    2. The Aniketos Service Composition Framework

      • Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou
      Pages 121-135
    3. Compliance Validation of Secure Service Compositions

      • Achim D. Brucker, Luca Compagna, Pierre Guilleminot
      Pages 136-149
    4. Aggregation and Optimisation of Trustworthiness of Composite Services

      • Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich
      Pages 150-172
  5. Run-Time Support Framework

    1. Monitoring Threats to Composite Services within the Aniketos Run-Time Framework

      • Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi
      Pages 173-191
    2. Security Policy Monitoring of Composite Services

      • Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, Qi Shi
      Pages 192-202
  6. Case Studies and Evaluation

    1. The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management

      • Stéphane Paul, Alessandra Tedeschi, Erlend Andreas Gjære, Ivonne Herrera
      Pages 203-218
    2. Supporting Security and Trust in Complex e-Government Services

      • Vasilis Tountopoulos, Ira Giannakoudaki, Konstantinos Giannakakis, Lefteris Korres, Leonidas Kallipolitis
      Pages 219-233
    3. Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome

      • Elke Beck, Sandra Trösterer, Alexander G. Mirnig, Manfred Tscheligi
      Pages 234-246
  7. Back Matter

About this book

The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing.

This state-of-the-art survey illustrates the results of the Aniketos – Secure and Trustworthy Composite Services – project (funded under the EU 7th Research Framework Programme). The papers included in the book describe the solutions developed during the 4-year project to establish and maintain trustworthiness and secure behavior in a constantly changing service environment. They provide service developers and providers with a secure service development framework that includes methods, tools, and security services supporting the design-time creation and run-time composition of secure dynamic services, where both the services and the threats are evolving. The 16 chapters are organized in the following thematic sections: state of the art of secure and trustworthy composite services; the Aniketos platform; design-time support framework; run-time support framework; and case studies and evaluation.

Editors and Affiliations

  • SAP SE, Karlsruhe, Germany

    Achim D. Brucker

  • Utrecht University, Utrecht, The Netherlands

    Fabiano Dalpiaz

  • DISI, University of Trento, Povo, Italy

    Paolo Giorgini

  • SINTEF ICT, Trondheim, Norway

    Per Håkon Meland

  • Parque Tecnológico de Bizkaia, TECNALIA Research & Innovation, Zamudio, Spain

    Erkuden Rios

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access