Reference Hub3
Behavioral Attestation for Web Services Based Business Processes

Behavioral Attestation for Web Services Based Business Processes

Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung, Quratulain Alam
Copyright: © 2010 |Volume: 7 |Issue: 3 |Pages: 21
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781609609108|DOI: 10.4018/jwsr.2010070103
Cite Article Cite Article

MLA

Alam, Masoom, et al. "Behavioral Attestation for Web Services Based Business Processes." IJWSR vol.7, no.3 2010: pp.52-72. http://doi.org/10.4018/jwsr.2010070103

APA

Alam, M., Nauman, M., Zhang, X., Ali, T., Hung, P. C., & Alam, Q. (2010). Behavioral Attestation for Web Services Based Business Processes. International Journal of Web Services Research (IJWSR), 7(3), 52-72. http://doi.org/10.4018/jwsr.2010070103

Chicago

Alam, Masoom, et al. "Behavioral Attestation for Web Services Based Business Processes," International Journal of Web Services Research (IJWSR) 7, no.3: 52-72. http://doi.org/10.4018/jwsr.2010070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for such inter-organizational workflows is the establishment of trustworthiness, which is mostly achieved through non-technical measures, such as legislation, and/or social consent that businesses or organizations pledge themselves to adhere. A business process can only be trustworthy if the behavior of all services in it is trustworthy. Trusted Computing Group (TCG) has defined an open set of specifications for the establishment of trustworthiness through a hardware root-of-trust. This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. Secondly, to overcome the inherent weaknesses of trust management through software alone, a hardware root of-trust devised by the TCG, is used for the measurement of the behavior of individual services in a business process. Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.