SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
IESS 1.1 Geneva 2011




 Profile-based Security
Assurances for Service
        Software
             Khaled Khan
   Computer Science and Engineering
           Qatar University
                Qatar
Overview


•  Context
•  Stakeholders of services
•  Research problems
•  Motivating Example
•  Proposed framework
•  Conclusion
Software Service, Composition and Security



•  An increasing interest in deploying software applications as services
   over the open communication channels
•  A software offering a service exists independently - developed,
   managed by third party service provider
•  These services are aimed for direct integration with any application
   system dynamically at run-time
•  A service may be secure in one application system, but the same
   service may not be secure in a different application due to different
   security requirements
•  The term `secure' is over-used and somehow misleading because it
   does not state the specific type of security achieved
Research Problems
•    End users with limited resources could compose application based on services which
     are consistent with their security requirements.

•    Services are normally associated with security features that are designed to withstand
     certain security threats

•    The representation of security properties for an end-user is quite different from those for
      –  a security expert, or
      –  a software engineer, or
      –  a different service consumer (end-user).

•    The current practice may lead the service consumer to select a service that does not tell
     much about its security assurances.

•    The way the security features are implemented, embedded and presented is often too
     complex for the service consumer to understand and use.

•    Services most often use the notion of “one-size-fits-all’ security assurances.

•    Consequently,
      –  Either service consumers do not use the services of which security properties are
         not well understood, or

      –  The security properties remain unused or wrongly configured in the application
         because these do not conform with the users security requirements.
Problems with Service Consumers
•  Difficult for the service consumer to verify the conformity
   of security properties between their security requirements
   and the assurances of third party services.

•  There are two explanations for this:
   –  Security properties are not specified in a form easily
      comprehensible by the service consumer who perhaps has
      limited knowledge of formal security technologies,

   –  A lack of a suitable framework with which they could select and
      compose their application based on security profiles of services
      and their security requirements.

•  Service consumers may not have enough background
   with formal education in computer science or security.
Research Issues

•    How can a service consumer know that the
     level of security assurances provided by the
     selected service software would meet her
     requirements?

                         and

•    How can the consumer verify immediately that
     the ensured security properties of the service
     are consistent with her security requirements?
A Motivating Example

•    Carol, a consumer, likes to book an item such as a hotel room, a car, or a
     flight.
•    The normal sequence of steps in a service-based application includes:
      –  Carol searches (a service) for her preferred reservation item, and selects
         the item;
      –  Then she provides her details (another service to make the reservation);
      –  Makes online payment (a service too), and
      –  Finally receives a bar-coded digital receipt (a service) of reservation.


•    In this journey of moving from one service to another in an integrated system
     environment (composed of multiple services), Carol may have different security
     requirements for each service she uses:
Security Requirements of Carol
      a)  For example, she wants her search parameters should not be used by anyone to
          link with her identity (a security property called non-linkability).
      b)  She also prefers her name, phone number, email and home address kept
          confidential (confidentiality).
      c)  She does not care if her suburb and street names are disclosed provided that
          none could identify her or her home address with these two pieces of
          information (non-deducability).
      d)  She also likes to have a guarantee that her credit card number is kept secret
          (confidentiality), and on one should be able to alter the amount she paid
          (integrity).
      e)  Carol also wants that no unauthorized entities are able to see (privacy) and make
          a copy of her receipt (authorization).
      f)  Finally, she needs an assurance that none could observe her activities in the
          Internet (non-observability).
•    We can see that Carol has very specific security requirements in this scenario.
•    Likewise, another consumer John, may have different requirements from Carol
     of the same reservation software system.
•    How do we handle these types of diverse security requirements?
Research Objectives and Approaches

•    Our work attempts to address the following research challenges project:
      –  How to make security assurances of service software transparent to consumers
      –  How to enable consumer select their security choices; and
      –  How to check the security compatibility of the selected security for services.




      Our approach has three main processes:
      –  Reflection of security assurances
      –  Selection of preferred assurances; and
      –  Checking of security compatibility.
Reflection of Security Assurances

•  Mechanisms for reflecting the security assurances of services.
•  Security provisions and requirements are published together with
   their service descriptions
•  Security characterization called security profiles
•  Attaching the security profile with service interfaces.
•  Stakeholder-based view
Levels of Implemented Security Functions

                                                        Development
                 Characterising              ISO/IEC    stage
Service
development      security properties of       15408
                 services                   Common
                                             criteria
                                                        Composition
                                                        stage
                     Establishing            Reasonin
Systems
composition          compositional               g
                     security properties     language

                                                        Operational
Execution            Deriving consumer-      Security   stage
                     level security goals     Goal


              Time
Stakeholders of Services

                     Design and Development of
Service developers            services              Development
                                                        and
                                                    deployment
 Security designer   Analysis of security threats
                     and implementation policies



Software engineer     Discovery of services and
                        functional integration       Operation
                                                       and
 Service consumer                                   Composition
                          User of composed
                             application



                                                                  Time
Four Perspectives of Service Security
Service consumer
   Specific security objectives actually achieved at the system-level
        (Operational time)

Software engineer
    Interested in the compositional impact and conformity of the
         security properties (Composition time)

Security designer
   Focuses technical details of the component security such as
        encryption
   Identifies the threats of the component, define the security
        policies and functions (service development time)

Service developer
   Design, build, deploy and manage services. (service design deployment
       time)
Abstraction Level of Security Properties
Selection of Preferred Assurances


•  Services should provide a choice of security assurances.
•  Capability that enables the consumer to select their preferred
   security assurances
•  Security profile must reflect the actual implementation of security
   functions
Checking of Security Compatibility

•  Security compatibility between interacting services are automatically
   analyzed
•  Conforms that they satisfy each other's security requirements.
•  Ensure that the selected security properties work without
   compromising service security provisions.
Concluding Remarks
•    Our framework has three anticipated innovative aspects.
      –  The first innovative aspect is that we approach security from a (service-
         based) software engineering perspective
          •  Adopt a proactive and predicative line of thinking.
          •  We emphasize on the service consumer's understanding and selection
             capabilities of service security properties
      –  The second innovative aspect is that the framework provides a semantic
         model that is essential to reason about the effectiveness of the selected
         security assurances
      –  The final aspect is the formal analysis techniques for security compatibility
         allow us to check automatically if the services in a composition are
         compatible in terms of security features
          •  Leads to compatible security-aware composition. This is critical to
             providing assurance to system users about the systems security
             behavior,
          •  Nurtures confidence and trust in the business community about service-
             based system security.

Mais conteúdo relacionado

Mais procurados

Software Requirements
Software RequirementsSoftware Requirements
Software RequirementsNethan Shaik
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoveryIDES Editor
 
Requirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsRequirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsKamalika Guha Roy
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacysoftware-engineering-book
 
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...Bin Liu
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsCSCJournals
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversysKrishnendu Paul
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareengPINKU29
 
Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering arvind pandey
 
IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]Akram Abbasi
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9Ian Sommerville
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...IJCSIS Research Publications
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4Mohammed Romi
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 javaRaju G P
 

Mais procurados (20)

Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service Discovery
 
Requirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsRequirement Engineering for Dependable Systems
Requirement Engineering for Dependable Systems
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
ppt
pptppt
ppt
 
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering
 
IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 java
 
Resume_Exp
Resume_ExpResume_Exp
Resume_Exp
 

Semelhante a Profile based security assurance for service

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...IJNSA Journal
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentortmbainjr131
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfElanusTechnologies
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 
Cloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxCloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxAdityaChawan4
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606Eben Visser
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Application Security
Application SecurityApplication Security
Application Securityonenolesguy
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erpManoj Jhawar
 
framework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxframework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxMuhammadAbdullah311866
 
COSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustCOSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustFrans Sauermann
 

Semelhante a Profile based security assurance for service (20)

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Security Design Concepts
Security Design ConceptsSecurity Design Concepts
Security Design Concepts
 
Unit 5
Unit 5Unit 5
Unit 5
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Cloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxCloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptx
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Application Security
Application SecurityApplication Security
Application Security
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erp
 
framework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxframework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptx
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
COSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustCOSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero Trust
 

Mais de IESS

Iess11 closing session
Iess11 closing sessionIess11 closing session
Iess11 closing sessionIESS
 
Comparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss modelsComparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss modelsIESS
 
Towards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logicTowards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logicIESS
 
Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...IESS
 
Strategy based service business development for sm es
Strategy based service business development for sm esStrategy based service business development for sm es
Strategy based service business development for sm esIESS
 
Business process flexibility in service composition
Business process flexibility in service compositionBusiness process flexibility in service composition
Business process flexibility in service compositionIESS
 
Service systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveService systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveIESS
 
Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needsIESS
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrializationIESS
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment processIESS
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovationIESS
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programsIESS
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...IESS
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa servicesIESS
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityIESS
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service scienceIESS
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systemsIESS
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvementIESS
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 introIESS
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 ClosingIESS
 

Mais de IESS (20)

Iess11 closing session
Iess11 closing sessionIess11 closing session
Iess11 closing session
 
Comparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss modelsComparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss models
 
Towards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logicTowards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logic
 
Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...
 
Strategy based service business development for sm es
Strategy based service business development for sm esStrategy based service business development for sm es
Strategy based service business development for sm es
 
Business process flexibility in service composition
Business process flexibility in service compositionBusiness process flexibility in service composition
Business process flexibility in service composition
 
Service systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveService systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspective
 
Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needs
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrialization
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment process
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovation
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programs
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa services
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service quality
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service science
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systems
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvement
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 intro
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 Closing
 

Último

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Último (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Profile based security assurance for service

  • 1. IESS 1.1 Geneva 2011 Profile-based Security Assurances for Service Software Khaled Khan Computer Science and Engineering Qatar University Qatar
  • 2. Overview •  Context •  Stakeholders of services •  Research problems •  Motivating Example •  Proposed framework •  Conclusion
  • 3. Software Service, Composition and Security •  An increasing interest in deploying software applications as services over the open communication channels •  A software offering a service exists independently - developed, managed by third party service provider •  These services are aimed for direct integration with any application system dynamically at run-time •  A service may be secure in one application system, but the same service may not be secure in a different application due to different security requirements •  The term `secure' is over-used and somehow misleading because it does not state the specific type of security achieved
  • 4. Research Problems •  End users with limited resources could compose application based on services which are consistent with their security requirements. •  Services are normally associated with security features that are designed to withstand certain security threats •  The representation of security properties for an end-user is quite different from those for –  a security expert, or –  a software engineer, or –  a different service consumer (end-user). •  The current practice may lead the service consumer to select a service that does not tell much about its security assurances. •  The way the security features are implemented, embedded and presented is often too complex for the service consumer to understand and use. •  Services most often use the notion of “one-size-fits-all’ security assurances. •  Consequently, –  Either service consumers do not use the services of which security properties are not well understood, or –  The security properties remain unused or wrongly configured in the application because these do not conform with the users security requirements.
  • 5. Problems with Service Consumers •  Difficult for the service consumer to verify the conformity of security properties between their security requirements and the assurances of third party services. •  There are two explanations for this: –  Security properties are not specified in a form easily comprehensible by the service consumer who perhaps has limited knowledge of formal security technologies, –  A lack of a suitable framework with which they could select and compose their application based on security profiles of services and their security requirements. •  Service consumers may not have enough background with formal education in computer science or security.
  • 6. Research Issues •  How can a service consumer know that the level of security assurances provided by the selected service software would meet her requirements? and •  How can the consumer verify immediately that the ensured security properties of the service are consistent with her security requirements?
  • 7. A Motivating Example •  Carol, a consumer, likes to book an item such as a hotel room, a car, or a flight. •  The normal sequence of steps in a service-based application includes: –  Carol searches (a service) for her preferred reservation item, and selects the item; –  Then she provides her details (another service to make the reservation); –  Makes online payment (a service too), and –  Finally receives a bar-coded digital receipt (a service) of reservation. •  In this journey of moving from one service to another in an integrated system environment (composed of multiple services), Carol may have different security requirements for each service she uses:
  • 8. Security Requirements of Carol a)  For example, she wants her search parameters should not be used by anyone to link with her identity (a security property called non-linkability). b)  She also prefers her name, phone number, email and home address kept confidential (confidentiality). c)  She does not care if her suburb and street names are disclosed provided that none could identify her or her home address with these two pieces of information (non-deducability). d)  She also likes to have a guarantee that her credit card number is kept secret (confidentiality), and on one should be able to alter the amount she paid (integrity). e)  Carol also wants that no unauthorized entities are able to see (privacy) and make a copy of her receipt (authorization). f)  Finally, she needs an assurance that none could observe her activities in the Internet (non-observability). •  We can see that Carol has very specific security requirements in this scenario. •  Likewise, another consumer John, may have different requirements from Carol of the same reservation software system. •  How do we handle these types of diverse security requirements?
  • 9. Research Objectives and Approaches •  Our work attempts to address the following research challenges project: –  How to make security assurances of service software transparent to consumers –  How to enable consumer select their security choices; and –  How to check the security compatibility of the selected security for services. Our approach has three main processes: –  Reflection of security assurances –  Selection of preferred assurances; and –  Checking of security compatibility.
  • 10. Reflection of Security Assurances •  Mechanisms for reflecting the security assurances of services. •  Security provisions and requirements are published together with their service descriptions •  Security characterization called security profiles •  Attaching the security profile with service interfaces. •  Stakeholder-based view
  • 11. Levels of Implemented Security Functions Development Characterising ISO/IEC stage Service development security properties of 15408 services Common criteria Composition stage Establishing Reasonin Systems composition compositional g security properties language Operational Execution Deriving consumer- Security stage level security goals Goal Time
  • 12. Stakeholders of Services Design and Development of Service developers services Development and deployment Security designer Analysis of security threats and implementation policies Software engineer Discovery of services and functional integration Operation and Service consumer Composition User of composed application Time
  • 13. Four Perspectives of Service Security Service consumer Specific security objectives actually achieved at the system-level (Operational time) Software engineer Interested in the compositional impact and conformity of the security properties (Composition time) Security designer Focuses technical details of the component security such as encryption Identifies the threats of the component, define the security policies and functions (service development time) Service developer Design, build, deploy and manage services. (service design deployment time)
  • 14. Abstraction Level of Security Properties
  • 15. Selection of Preferred Assurances •  Services should provide a choice of security assurances. •  Capability that enables the consumer to select their preferred security assurances •  Security profile must reflect the actual implementation of security functions
  • 16. Checking of Security Compatibility •  Security compatibility between interacting services are automatically analyzed •  Conforms that they satisfy each other's security requirements. •  Ensure that the selected security properties work without compromising service security provisions.
  • 17. Concluding Remarks •  Our framework has three anticipated innovative aspects. –  The first innovative aspect is that we approach security from a (service- based) software engineering perspective •  Adopt a proactive and predicative line of thinking. •  We emphasize on the service consumer's understanding and selection capabilities of service security properties –  The second innovative aspect is that the framework provides a semantic model that is essential to reason about the effectiveness of the selected security assurances –  The final aspect is the formal analysis techniques for security compatibility allow us to check automatically if the services in a composition are compatible in terms of security features •  Leads to compatible security-aware composition. This is critical to providing assurance to system users about the systems security behavior, •  Nurtures confidence and trust in the business community about service- based system security.