Reference Hub2
Web Service Composition Security: A Three-Dimensions Overview

Web Service Composition Security: A Three-Dimensions Overview

Mohsen Rouached
Copyright: © 2021 |Volume: 12 |Issue: 3 |Pages: 21
ISSN: 1947-959X|EISSN: 1947-9603|EISBN13: 9781799860921|DOI: 10.4018/IJSSMET.2021050109
Cite Article Cite Article

MLA

Rouached, Mohsen. "Web Service Composition Security: A Three-Dimensions Overview." IJSSMET vol.12, no.3 2021: pp.154-174. http://doi.org/10.4018/IJSSMET.2021050109

APA

Rouached, M. (2021). Web Service Composition Security: A Three-Dimensions Overview. International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 12(3), 154-174. http://doi.org/10.4018/IJSSMET.2021050109

Chicago

Rouached, Mohsen. "Web Service Composition Security: A Three-Dimensions Overview," International Journal of Service Science, Management, Engineering, and Technology (IJSSMET) 12, no.3: 154-174. http://doi.org/10.4018/IJSSMET.2021050109

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The continuous adoption of service-oriented architecture (SOA) and web services across vertical industries, geographies, and organization sizes generates new major security concerns both for individuals and organizations. Many of the features that make web services attractive, including greater accessibility of data, dynamic application-to-application connections, and relative autonomy are at odds with traditional security models and controls. Current web service composition technologies still present serious risks to individual and enterprise security and privacy. In the presence of multiple providers that coordinate to provide a composite web service, these issues are amplified. Web services security, privacy, and forensics investigations are therefore becoming a serious concern, especially with the tremendous increase in cybernetic crimes. The aim of this work is to draw a comprehensive overview about security aspects related to web services composition by considering different branches related to security, privacy, and forensics investigations. For each security aspect, the problem statement and related works are discussed. Then, a proposed approach to deal with the aspect under consideration is presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.