SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
IESS 1.1 Geneva 2011




 Profile-based Security
Assurances for Service
        Software
             Khaled Khan
   Computer Science and Engineering
           Qatar University
                Qatar
Overview


•  Context
•  Stakeholders of services
•  Research problems
•  Motivating Example
•  Proposed framework
•  Conclusion
Software Service, Composition and Security



•  An increasing interest in deploying software applications as services
   over the open communication channels
•  A software offering a service exists independently - developed,
   managed by third party service provider
•  These services are aimed for direct integration with any application
   system dynamically at run-time
•  A service may be secure in one application system, but the same
   service may not be secure in a different application due to different
   security requirements
•  The term `secure' is over-used and somehow misleading because it
   does not state the specific type of security achieved
Research Problems
•    End users with limited resources could compose application based on services which
     are consistent with their security requirements.

•    Services are normally associated with security features that are designed to withstand
     certain security threats

•    The representation of security properties for an end-user is quite different from those for
      –  a security expert, or
      –  a software engineer, or
      –  a different service consumer (end-user).

•    The current practice may lead the service consumer to select a service that does not tell
     much about its security assurances.

•    The way the security features are implemented, embedded and presented is often too
     complex for the service consumer to understand and use.

•    Services most often use the notion of “one-size-fits-all’ security assurances.

•    Consequently,
      –  Either service consumers do not use the services of which security properties are
         not well understood, or

      –  The security properties remain unused or wrongly configured in the application
         because these do not conform with the users security requirements.
Problems with Service Consumers
•  Difficult for the service consumer to verify the conformity
   of security properties between their security requirements
   and the assurances of third party services.

•  There are two explanations for this:
   –  Security properties are not specified in a form easily
      comprehensible by the service consumer who perhaps has
      limited knowledge of formal security technologies,

   –  A lack of a suitable framework with which they could select and
      compose their application based on security profiles of services
      and their security requirements.

•  Service consumers may not have enough background
   with formal education in computer science or security.
Research Issues

•    How can a service consumer know that the
     level of security assurances provided by the
     selected service software would meet her
     requirements?

                         and

•    How can the consumer verify immediately that
     the ensured security properties of the service
     are consistent with her security requirements?
A Motivating Example

•    Carol, a consumer, likes to book an item such as a hotel room, a car, or a
     flight.
•    The normal sequence of steps in a service-based application includes:
      –  Carol searches (a service) for her preferred reservation item, and selects
         the item;
      –  Then she provides her details (another service to make the reservation);
      –  Makes online payment (a service too), and
      –  Finally receives a bar-coded digital receipt (a service) of reservation.


•    In this journey of moving from one service to another in an integrated system
     environment (composed of multiple services), Carol may have different security
     requirements for each service she uses:
Security Requirements of Carol
      a)  For example, she wants her search parameters should not be used by anyone to
          link with her identity (a security property called non-linkability).
      b)  She also prefers her name, phone number, email and home address kept
          confidential (confidentiality).
      c)  She does not care if her suburb and street names are disclosed provided that
          none could identify her or her home address with these two pieces of
          information (non-deducability).
      d)  She also likes to have a guarantee that her credit card number is kept secret
          (confidentiality), and on one should be able to alter the amount she paid
          (integrity).
      e)  Carol also wants that no unauthorized entities are able to see (privacy) and make
          a copy of her receipt (authorization).
      f)  Finally, she needs an assurance that none could observe her activities in the
          Internet (non-observability).
•    We can see that Carol has very specific security requirements in this scenario.
•    Likewise, another consumer John, may have different requirements from Carol
     of the same reservation software system.
•    How do we handle these types of diverse security requirements?
Research Objectives and Approaches

•    Our work attempts to address the following research challenges project:
      –  How to make security assurances of service software transparent to consumers
      –  How to enable consumer select their security choices; and
      –  How to check the security compatibility of the selected security for services.




      Our approach has three main processes:
      –  Reflection of security assurances
      –  Selection of preferred assurances; and
      –  Checking of security compatibility.
Reflection of Security Assurances

•  Mechanisms for reflecting the security assurances of services.
•  Security provisions and requirements are published together with
   their service descriptions
•  Security characterization called security profiles
•  Attaching the security profile with service interfaces.
•  Stakeholder-based view
Levels of Implemented Security Functions

                                                        Development
                 Characterising              ISO/IEC    stage
Service
development      security properties of       15408
                 services                   Common
                                             criteria
                                                        Composition
                                                        stage
                     Establishing            Reasonin
Systems
composition          compositional               g
                     security properties     language

                                                        Operational
Execution            Deriving consumer-      Security   stage
                     level security goals     Goal


              Time
Stakeholders of Services

                     Design and Development of
Service developers            services              Development
                                                        and
                                                    deployment
 Security designer   Analysis of security threats
                     and implementation policies



Software engineer     Discovery of services and
                        functional integration       Operation
                                                       and
 Service consumer                                   Composition
                          User of composed
                             application



                                                                  Time
Four Perspectives of Service Security
Service consumer
   Specific security objectives actually achieved at the system-level
        (Operational time)

Software engineer
    Interested in the compositional impact and conformity of the
         security properties (Composition time)

Security designer
   Focuses technical details of the component security such as
        encryption
   Identifies the threats of the component, define the security
        policies and functions (service development time)

Service developer
   Design, build, deploy and manage services. (service design deployment
       time)
Abstraction Level of Security Properties
Selection of Preferred Assurances


•  Services should provide a choice of security assurances.
•  Capability that enables the consumer to select their preferred
   security assurances
•  Security profile must reflect the actual implementation of security
   functions
Checking of Security Compatibility

•  Security compatibility between interacting services are automatically
   analyzed
•  Conforms that they satisfy each other's security requirements.
•  Ensure that the selected security properties work without
   compromising service security provisions.
Concluding Remarks
•    Our framework has three anticipated innovative aspects.
      –  The first innovative aspect is that we approach security from a (service-
         based) software engineering perspective
          •  Adopt a proactive and predicative line of thinking.
          •  We emphasize on the service consumer's understanding and selection
             capabilities of service security properties
      –  The second innovative aspect is that the framework provides a semantic
         model that is essential to reason about the effectiveness of the selected
         security assurances
      –  The final aspect is the formal analysis techniques for security compatibility
         allow us to check automatically if the services in a composition are
         compatible in terms of security features
          •  Leads to compatible security-aware composition. This is critical to
             providing assurance to system users about the systems security
             behavior,
          •  Nurtures confidence and trust in the business community about service-
             based system security.

Contenu connexe

Tendances

Software Requirements
Software RequirementsSoftware Requirements
Software RequirementsNethan Shaik
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoveryIDES Editor
 
Requirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsRequirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsKamalika Guha Roy
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacysoftware-engineering-book
 
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...Bin Liu
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsCSCJournals
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversysKrishnendu Paul
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareengPINKU29
 
Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering arvind pandey
 
IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]Akram Abbasi
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9Ian Sommerville
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...IJCSIS Research Publications
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4Mohammed Romi
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 javaRaju G P
 

Tendances (20)

Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service Discovery
 
Requirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsRequirement Engineering for Dependable Systems
Requirement Engineering for Dependable Systems
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
ppt
pptppt
ppt
 
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering
 
IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 java
 
Resume_Exp
Resume_ExpResume_Exp
Resume_Exp
 

Similaire à Profile based security assurance for service

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...IJNSA Journal
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentortmbainjr131
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfElanusTechnologies
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 
Cloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxCloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxAdityaChawan4
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606Eben Visser
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Application Security
Application SecurityApplication Security
Application Securityonenolesguy
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxGhofraneFerchichi2
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erpManoj Jhawar
 
framework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxframework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxMuhammadAbdullah311866
 

Similaire à Profile based security assurance for service (20)

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Security Design Concepts
Security Design ConceptsSecurity Design Concepts
Security Design Concepts
 
Unit 5
Unit 5Unit 5
Unit 5
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Cloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxCloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptx
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Application Security
Application SecurityApplication Security
Application Security
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erp
 
framework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxframework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptx
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 

Plus de IESS

Iess11 closing session
Iess11 closing sessionIess11 closing session
Iess11 closing sessionIESS
 
Comparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss modelsComparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss modelsIESS
 
Towards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logicTowards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logicIESS
 
Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...IESS
 
Strategy based service business development for sm es
Strategy based service business development for sm esStrategy based service business development for sm es
Strategy based service business development for sm esIESS
 
Business process flexibility in service composition
Business process flexibility in service compositionBusiness process flexibility in service composition
Business process flexibility in service compositionIESS
 
Service systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveService systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveIESS
 
Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needsIESS
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrializationIESS
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment processIESS
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovationIESS
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programsIESS
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...IESS
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa servicesIESS
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityIESS
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service scienceIESS
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systemsIESS
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvementIESS
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 introIESS
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 ClosingIESS
 

Plus de IESS (20)

Iess11 closing session
Iess11 closing sessionIess11 closing session
Iess11 closing session
 
Comparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss modelsComparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss models
 
Towards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logicTowards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logic
 
Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...
 
Strategy based service business development for sm es
Strategy based service business development for sm esStrategy based service business development for sm es
Strategy based service business development for sm es
 
Business process flexibility in service composition
Business process flexibility in service compositionBusiness process flexibility in service composition
Business process flexibility in service composition
 
Service systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveService systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspective
 
Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needs
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrialization
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment process
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovation
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programs
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa services
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service quality
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service science
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systems
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvement
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 intro
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 Closing
 

Dernier

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Dernier (20)

Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Profile based security assurance for service

  • 1. IESS 1.1 Geneva 2011 Profile-based Security Assurances for Service Software Khaled Khan Computer Science and Engineering Qatar University Qatar
  • 2. Overview •  Context •  Stakeholders of services •  Research problems •  Motivating Example •  Proposed framework •  Conclusion
  • 3. Software Service, Composition and Security •  An increasing interest in deploying software applications as services over the open communication channels •  A software offering a service exists independently - developed, managed by third party service provider •  These services are aimed for direct integration with any application system dynamically at run-time •  A service may be secure in one application system, but the same service may not be secure in a different application due to different security requirements •  The term `secure' is over-used and somehow misleading because it does not state the specific type of security achieved
  • 4. Research Problems •  End users with limited resources could compose application based on services which are consistent with their security requirements. •  Services are normally associated with security features that are designed to withstand certain security threats •  The representation of security properties for an end-user is quite different from those for –  a security expert, or –  a software engineer, or –  a different service consumer (end-user). •  The current practice may lead the service consumer to select a service that does not tell much about its security assurances. •  The way the security features are implemented, embedded and presented is often too complex for the service consumer to understand and use. •  Services most often use the notion of “one-size-fits-all’ security assurances. •  Consequently, –  Either service consumers do not use the services of which security properties are not well understood, or –  The security properties remain unused or wrongly configured in the application because these do not conform with the users security requirements.
  • 5. Problems with Service Consumers •  Difficult for the service consumer to verify the conformity of security properties between their security requirements and the assurances of third party services. •  There are two explanations for this: –  Security properties are not specified in a form easily comprehensible by the service consumer who perhaps has limited knowledge of formal security technologies, –  A lack of a suitable framework with which they could select and compose their application based on security profiles of services and their security requirements. •  Service consumers may not have enough background with formal education in computer science or security.
  • 6. Research Issues •  How can a service consumer know that the level of security assurances provided by the selected service software would meet her requirements? and •  How can the consumer verify immediately that the ensured security properties of the service are consistent with her security requirements?
  • 7. A Motivating Example •  Carol, a consumer, likes to book an item such as a hotel room, a car, or a flight. •  The normal sequence of steps in a service-based application includes: –  Carol searches (a service) for her preferred reservation item, and selects the item; –  Then she provides her details (another service to make the reservation); –  Makes online payment (a service too), and –  Finally receives a bar-coded digital receipt (a service) of reservation. •  In this journey of moving from one service to another in an integrated system environment (composed of multiple services), Carol may have different security requirements for each service she uses:
  • 8. Security Requirements of Carol a)  For example, she wants her search parameters should not be used by anyone to link with her identity (a security property called non-linkability). b)  She also prefers her name, phone number, email and home address kept confidential (confidentiality). c)  She does not care if her suburb and street names are disclosed provided that none could identify her or her home address with these two pieces of information (non-deducability). d)  She also likes to have a guarantee that her credit card number is kept secret (confidentiality), and on one should be able to alter the amount she paid (integrity). e)  Carol also wants that no unauthorized entities are able to see (privacy) and make a copy of her receipt (authorization). f)  Finally, she needs an assurance that none could observe her activities in the Internet (non-observability). •  We can see that Carol has very specific security requirements in this scenario. •  Likewise, another consumer John, may have different requirements from Carol of the same reservation software system. •  How do we handle these types of diverse security requirements?
  • 9. Research Objectives and Approaches •  Our work attempts to address the following research challenges project: –  How to make security assurances of service software transparent to consumers –  How to enable consumer select their security choices; and –  How to check the security compatibility of the selected security for services. Our approach has three main processes: –  Reflection of security assurances –  Selection of preferred assurances; and –  Checking of security compatibility.
  • 10. Reflection of Security Assurances •  Mechanisms for reflecting the security assurances of services. •  Security provisions and requirements are published together with their service descriptions •  Security characterization called security profiles •  Attaching the security profile with service interfaces. •  Stakeholder-based view
  • 11. Levels of Implemented Security Functions Development Characterising ISO/IEC stage Service development security properties of 15408 services Common criteria Composition stage Establishing Reasonin Systems composition compositional g security properties language Operational Execution Deriving consumer- Security stage level security goals Goal Time
  • 12. Stakeholders of Services Design and Development of Service developers services Development and deployment Security designer Analysis of security threats and implementation policies Software engineer Discovery of services and functional integration Operation and Service consumer Composition User of composed application Time
  • 13. Four Perspectives of Service Security Service consumer Specific security objectives actually achieved at the system-level (Operational time) Software engineer Interested in the compositional impact and conformity of the security properties (Composition time) Security designer Focuses technical details of the component security such as encryption Identifies the threats of the component, define the security policies and functions (service development time) Service developer Design, build, deploy and manage services. (service design deployment time)
  • 14. Abstraction Level of Security Properties
  • 15. Selection of Preferred Assurances •  Services should provide a choice of security assurances. •  Capability that enables the consumer to select their preferred security assurances •  Security profile must reflect the actual implementation of security functions
  • 16. Checking of Security Compatibility •  Security compatibility between interacting services are automatically analyzed •  Conforms that they satisfy each other's security requirements. •  Ensure that the selected security properties work without compromising service security provisions.
  • 17. Concluding Remarks •  Our framework has three anticipated innovative aspects. –  The first innovative aspect is that we approach security from a (service- based) software engineering perspective •  Adopt a proactive and predicative line of thinking. •  We emphasize on the service consumer's understanding and selection capabilities of service security properties –  The second innovative aspect is that the framework provides a semantic model that is essential to reason about the effectiveness of the selected security assurances –  The final aspect is the formal analysis techniques for security compatibility allow us to check automatically if the services in a composition are compatible in terms of security features •  Leads to compatible security-aware composition. This is critical to providing assurance to system users about the systems security behavior, •  Nurtures confidence and trust in the business community about service- based system security.