WSA. We can outline how we can address the
implementation of this model for each specific
scenario using Web services standards. The central
point in this approach is that both service consumer
and provider have to define their respective security
policies related to WSbS*-RM. Expression of these
policies can be based on WS-Policy. On the other
hand, PSO, PSC and PSS can be transmitted in a
secure manner using WS-Security standard. In order
to define PS*-certs, XML-Dsig, XML-Encryption,
SAML and XML-Schema enable security and
mechanisms to ensure all security issues described.
Finally UDDI, could be used to get a reference for
the identity of each WSbS* actors.
5 CONCLUSIONS
The main contribution of our paper is the definition
of a conceptual framework for the assurance of
integral code and state security in SOA. It is a
framework where not only the message security is
considered, but also the security of the code that
processes it. Besides, we propose an extra level of
security in a service interaction considering both
code and state. Finally, an incremental model of
security based on certificates issued by each model
actor provides a means for ensure security and
achieve a trusted environment.
Our main lines of research are: (1) to work on
the implementation of the model in several real
world scenarios; (2) to improve security between
state and methods using secret sharing techniques
(as commented in section 3.3); (3) we have realized
that both code and state share similar actors. This
has suggested us a new line of research for the
definition of a meta-model that would describe
uniformly the structure and the behaviour of the
state and the code security models.
ACKNOWLEDGEMENTS
Partially supported by project FOMENTA 2008/01
of the Comunidad Autónoma de La Rioja.
REFERENCES
Bhargavan, K., Fournet, C., Gordon, A.D., 2004.
Verifying policy-based security for web services. In
Proceedings of the 11th ACM conference on
Computer and communications security, October 2004
Birman, K.P., 2004. Like it or not, web services are
distributed objects. In Communications of the ACM,
december 2004
Chang, B-Y. E., Chlipala, A., Necula, G.C., Schneck,
R.R:, 2005. The open verifier framework for
foundational verifiers. In Proceedings of the 2005
ACM SIGPLAN international workshop on Types in
languages design and implementation, January 2005
Claessens, J., Preneel, B., Vandewalle, J., 2003. (How)
can mobile agents do secure electronic transactions on
untrusted hosts? A survey of the security issues and
the current solutions, ACM Transactions on Internet
Technology (TOIT), February 2003
European Project, 2006. Security of Software and Services
for Mobile Systems,http://www.s3ms.org, March
2006.
Franz, M., Chandra, D., Gal, A., Haldar, V., Reig, F.,
Wang, N., 2003. A portable Virtual Machine target for
Proof-Carrying Code. In Proceedings of the 2003
workshop on Interpreters, virtual machines and
emulators, June 2003
Foster, I., Parastatidis, S.,Watson, P., Mckeown, M., 2008.
How do I model state?: Let me count the ways. In
Communications of the ACM, september 2008.
Gutiérrez, C., Fernández Medina, E. and Piattini, M.,
2005. Web Services Enterprise Security Architecture:
A Case Study. SWS'05, november 11, 2005
Lange, D.B., Oshima, M., 1999. Seven good reasons for
mobile agents”, Communications of the ACM, v.42
n.3, p.88-89, March 1999
Miao, C.,Wei, R., 2003. Secret Sharing for Mobile Agent
Cryptography. In Communication Networks and
Services Research Conference, Session B
Rodríguez Priego,E., García Izquierdo,F.J., 2007.
Securing Code in Services Oriented Architecture,
ICWE07. LNCS 4607, pp. 450-555. Springer-Verlag
2007.
Rubin, A.D., Geer Jr., D.E., 1998. Mobile Code Security,
IEEE Internet Computing, vol. 02, no. 6, pp. 30-34,
Nov/Dec, 1998
Sekar, R., Ramakrishnan, C. R., Ramakrishnan, I. V.,
Smolka, S. A., 2001. Model-Carrying Code (MCC): a
new paradigm for mobile-code security. In
Proceedings of the 2001 workshop on New security
paradigms, September 2001
Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla,
P., 2006. Externally verifiable code execution. In
Communications of the ACM, september 2006.
Shamir, A., 1979. How to share a secret. Commun. ACM
22, 11 (Nov. 1979), 612-613
Whitman, M.E., 2003. Enemy At The Gate: Threats To
Information Security. In Communications of the
ACM, August 2003
OASIS, 2006. Reference Model for SOA v1.0
OASIS, 2008. Reference Architecture for SOA v1.0
Vogels, W., 2003. Web services are not distributed
objects. In Internet Computing, Dec. 2003
W3C, 2004. Web Services Architecture
INTEGRAL SECURITY MODEL FOR THE EXCHANGE OF OBJECTS IN SERVICES ORIENTED ARCHITECTURE
65