The design and enforcement of a rule-based constraint policy language for service composition

Wei Wei, Ting Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one must be able to specify and enforce a variety of constraints such as those derived from legal regulations, Quality of Service (QoS) requirements and privacy and security policies. In this paper, we show through concrete examples that constraints involving topologies are common for composed services but are rarely supported by existing service composition policy languages. We then present a rule-based constraint policy language built on top of a general graph-based service composition model. The language provides a unified treatment to support both attribute-based and topology-based constraints. We further design an ontology-based policy framework for effective policy enforcement and analysis. Finally, we implement a prototype policy management system for service composition, and conduct extensive experiments to evaluate the effectiveness of the proposed techniques.

Original languageEnglish
Title of host publicationProceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust
Pages873-880
Number of pages8
DOIs
Publication statusPublished - 29 Nov 2010
Externally publishedYes
Event2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 - Minneapolis, MN, United States
Duration: 20 Aug 201022 Aug 2010

Other

Other2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010
CountryUnited States
CityMinneapolis, MN
Period20/8/1022/8/10

Fingerprint

Chemical analysis
Topology
Ontology
Quality of service
Costs
Experiments

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Cite this

Wei, W., & Yu, T. (2010). The design and enforcement of a rule-based constraint policy language for service composition. In Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust (pp. 873-880). [5591439] https://doi.org/1109/SocialCom.2010.130

The design and enforcement of a rule-based constraint policy language for service composition. / Wei, Wei; Yu, Ting.

Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. 2010. p. 873-880 5591439.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wei, W & Yu, T 2010, The design and enforcement of a rule-based constraint policy language for service composition. in Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust., 5591439, pp. 873-880, 2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, MN, United States, 20/8/10. https://doi.org/1109/SocialCom.2010.130
Wei W, Yu T. The design and enforcement of a rule-based constraint policy language for service composition. In Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. 2010. p. 873-880. 5591439 https://doi.org/1109/SocialCom.2010.130
Wei, Wei ; Yu, Ting. / The design and enforcement of a rule-based constraint policy language for service composition. Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. 2010. pp. 873-880
@inproceedings{242050d39a744e108ca17eea6c170d4b,
title = "The design and enforcement of a rule-based constraint policy language for service composition",
abstract = "Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one must be able to specify and enforce a variety of constraints such as those derived from legal regulations, Quality of Service (QoS) requirements and privacy and security policies. In this paper, we show through concrete examples that constraints involving topologies are common for composed services but are rarely supported by existing service composition policy languages. We then present a rule-based constraint policy language built on top of a general graph-based service composition model. The language provides a unified treatment to support both attribute-based and topology-based constraints. We further design an ontology-based policy framework for effective policy enforcement and analysis. Finally, we implement a prototype policy management system for service composition, and conduct extensive experiments to evaluate the effectiveness of the proposed techniques.",
author = "Wei Wei and Ting Yu",
year = "2010",
month = "11",
day = "29",
doi = "1109/SocialCom.2010.130",
language = "English",
isbn = "9780769542119",
pages = "873--880",
booktitle = "Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust",

}

TY - GEN

T1 - The design and enforcement of a rule-based constraint policy language for service composition

AU - Wei, Wei

AU - Yu, Ting

PY - 2010/11/29

Y1 - 2010/11/29

N2 - Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one must be able to specify and enforce a variety of constraints such as those derived from legal regulations, Quality of Service (QoS) requirements and privacy and security policies. In this paper, we show through concrete examples that constraints involving topologies are common for composed services but are rarely supported by existing service composition policy languages. We then present a rule-based constraint policy language built on top of a general graph-based service composition model. The language provides a unified treatment to support both attribute-based and topology-based constraints. We further design an ontology-based policy framework for effective policy enforcement and analysis. Finally, we implement a prototype policy management system for service composition, and conduct extensive experiments to evaluate the effectiveness of the proposed techniques.

AB - Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one must be able to specify and enforce a variety of constraints such as those derived from legal regulations, Quality of Service (QoS) requirements and privacy and security policies. In this paper, we show through concrete examples that constraints involving topologies are common for composed services but are rarely supported by existing service composition policy languages. We then present a rule-based constraint policy language built on top of a general graph-based service composition model. The language provides a unified treatment to support both attribute-based and topology-based constraints. We further design an ontology-based policy framework for effective policy enforcement and analysis. Finally, we implement a prototype policy management system for service composition, and conduct extensive experiments to evaluate the effectiveness of the proposed techniques.

UR - http://www.scopus.com/inward/record.url?scp=78649235103&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78649235103&partnerID=8YFLogxK

U2 - 1109/SocialCom.2010.130

DO - 1109/SocialCom.2010.130

M3 - Conference contribution

SN - 9780769542119

SP - 873

EP - 880

BT - Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust

ER -