framework, i.e. the configuration takes place in a model-driven way from which
executable artifacts are produced. This leaves the engine open to any kind of
protocols, not only Non-repudiation protocols.
A first step into this direction could be to integrate a Non-repudiation protocol
without TTP. Different kinds of protocols need different kinds of primitives. A kind
of plug-in mechanism would render the architecture more flexible.
Another case not discussed in this paper is the dispute resolution. Here, a judge has
to collect evidence from the participants and probably from the TTP.
Overall, we can say that the model-driven configuration of security requirements
and protocols in this case offers many possibilities in rendering a system more
flexible and considering security aspects in an early phase of development. The
evaluation of the profitability of for such a Protocol Engine with its configurability of
a lower layer is an interesting open problem for future research.
References
1. Hafner, M., M.M. Alam, and R. Breu. Towards a MOF/QVT-based Domain Architecture
for Model Driven Security. in Models 2006. 2006. Genova, Italy.
2. Hafner, M., et al. Realizing Advanced Security Requirements for Inter-organizational
Workflows. in eChallenges 2006. 2006. Bacelona, Spain.
3. Hafner, M., et al. Sectet - An Extensible Framework for the Realization of Secure Inter-
Organizational Workflows. in WOSIS 2006. 2006. Paphos, Cyprus: INSTICC Press.
4. Bartel, M., et al. XML-Signature Syntax and Processing. 2002 [cited 2007 19.01.];
Available from: http://www.w3.org/TR/xmldsig-core/.
5. SOAP Version 1.2 Part 1: Messaging Framework. 2003 [cited 2007 19.01.]; Available
from: http://www.w3.org/TR/soap/.
6. Hada, S. SOAP security extensions: digital signature. 2001 [cited 2007 18.01.]; Available
from: http://www-128.ibm.com/developerworks/library/ws-soapsec/.
7. Freier, A., P. Karlton, and P. Kocher, The SSL Protocol Version 3.0. 1996.
8. Gravengaard, E., Web Services Security: Non-Repudiation. 2003.
9. Zhou, J. and D. Gollmann, A Fair Non-repudiation Protocol. 1995: University of London,
Royal Holloway, Department of Computer Science.
10. Markowitch, O. and Y. Roggeman, Probabilistic non-repudiation without trusted third
party. Second Conference on Security in Communication Networks, 1999. 99.
11. Kremer, S., O. Markowitch, and J. Zhou, An intensive survey of fair non-repudiation
protocols. Computer Communications, 2002. 25(17): p. 1606-1621.
12. Graham, S., et al. Web Services Resource 1.2. 2006 [cited 2007 19.01.]; Available from:
http://docs.oasis-open.org/wsrf/wsrf-ws_resource-1.2-spec-os.pdf.
72