service compositions: curse or blessing for security?

33
Service Compositions: Curse or Blessing for Security? Achim D. Brucker [email protected] http://www.brucker.ch/ SAP AG, Products & Innovation, Products and Innovations, Product Security Research Vincenz-Priessnitz-Str. 1, 76131 Karlsruhe, Germany 2nd International Workshop on Behavioural Types September 23-24 2013, Madrid, Spain

Upload: achim-d-brucker

Post on 18-Dec-2014

1.885 views

Category:

Technology


2 download

DESCRIPTION

Building large systems by composing reusable services is not a new idea, it is at least 25 years old. Still, only recently the scenario of dynamic interchangeable services that are consumed via public networks is becoming reality. Following the Software as a Service (Saas) paradigm, an increasing number of complex applications is offered as a service that themselves can be used composed for building even larger and more complex applications. This will lead to situations in which users are likely to unknowingly consume services in a dynamic and ad hoc manner. Leaving the rather static (and mostly on-premise) service composition scenarios of the past 25 years behind us, dynamic service compositions, have not only the potential to transform the software industry from a business perspective, they also requires new approaches for addressing the security, trustworthiness needs of users. The EU FP7 project Aniketos develops new technology, methods, tools and security services that support the design-time creation and run-time dynamic behaviour of dynamic service compositions, addressing service developers, service providers and service end users. In this talk, we will motivate several security and trustworthiness requirements that occur in dynamic service compositions and discuss the solutions developed within the project Aniketos. Based on our experiences, we will discuss open research challenges and potential opportunities for potential opportunities for applying type systems.

TRANSCRIPT

Page 1: Service Compositions: Curse or Blessing for Security?

Service Compositions

Curse or Blessing for Security

Achim D Bruckerachimbruckersapcom

httpwwwbruckerch

SAP AG Products amp Innovation Products and Innovations Product Security ResearchVincenz-Priessnitz-Str 1 76131 Karlsruhe Germany

2nd International Workshop on Behavioural TypesSeptember 23-24 2013 Madrid Spain

Abstract

Building large systems by composing reusable services is not a new idea it is at least25 years old Still only recently the scenario of dynamic interchangeable servicesthat are consumed via public networks is becoming reality Following the Software asa Service (Saas) paradigm an increasing number of complex applications is offeredas a service that themselves can be used composed for building even larger andmore complex applications This will lead to situations in which users are likely tounknowingly consume services in a dynamic and ad hoc mannerLeaving the rather static (and mostly on-premise) service composition scenarios ofthe past 25 years behind us dynamic service compositions have not only thepotential to transform the software industry from a business perspective they alsorequires new approaches for addressing the security trustworthiness needs of usersThe EU FP7 project Aniketos develops new technology methods tools and securityservices that support the design-time creation and run-time dynamic behaviour ofdynamic service compositions addressing service developers service providers andservice end usersIn this talk we will motivate several security and trustworthiness requirements thatoccur in dynamic service compositions and discuss the solutions developed within theproject Aniketos Based on our experiences we will discuss open research challengesand potential opportunities for potential opportunities for applying type systems

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 2

About Me

My Employer SAP AG

Vendor of enterprise software systems

Worldrsquos third largest software vendor

More than 25 industries

63 of the worldrsquos transaction revenuetouches an SAP system

64 422 employees worldwide

Personal Background

Senior ResearcherSecurity Formal Methods Software Engineering

Security Expertsupporting all phases of a SDLC

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 3

The Aniketos ProjectEnable composite services to establish and maintain security and trustworthiness

Goals of the Aniketos platform

Design-time discovery compositionand evaluation threat awareness

Runtime adaptation or change inservice configuration

Runtime monitoring detectionnotification

Two related dimensions

Trustworthiness Reputationperception centralised vsdistributed

Security properties Behaviourcontracts interfaces formalverification

Aniketos Fact-Sheet

EU Integrated Project (IP) FP7 Call 5

Budget euro 139 Mio (euro 96 Mio funding)

42 month (Aug 2010 ndash Feb 2014)

Coordinator Sintef (Norway)

httpwwwaniketoseu

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 4

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Past Service Compositions

ldquo Service a mechanism to enable access to one or more capabilitieswhere the access is provided using a prescribed interface withconstraints and policies as specified by the service description

OASIS Reference Model for Service Oriented Architecture

At least 20 years old

RPCs introduced in 1980sCORBA published in 1991

Motivated by

re-useabilityreliability

Used within organisations

Frameworks considered to beheavy-weight

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 6

The Past Secure Service Compositions

Photo Holger Weinandt

Recall the past

networks were expensive (and slow)only a few people had access tonetworked systems

Security modelnon-technical trust

small numbers of users allowinga personal relationshipsystem operators trust their users

security perimeter

limited accessfirewallscontrolled system access

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 7

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 2: Service Compositions: Curse or Blessing for Security?

Abstract

Building large systems by composing reusable services is not a new idea it is at least25 years old Still only recently the scenario of dynamic interchangeable servicesthat are consumed via public networks is becoming reality Following the Software asa Service (Saas) paradigm an increasing number of complex applications is offeredas a service that themselves can be used composed for building even larger andmore complex applications This will lead to situations in which users are likely tounknowingly consume services in a dynamic and ad hoc mannerLeaving the rather static (and mostly on-premise) service composition scenarios ofthe past 25 years behind us dynamic service compositions have not only thepotential to transform the software industry from a business perspective they alsorequires new approaches for addressing the security trustworthiness needs of usersThe EU FP7 project Aniketos develops new technology methods tools and securityservices that support the design-time creation and run-time dynamic behaviour ofdynamic service compositions addressing service developers service providers andservice end usersIn this talk we will motivate several security and trustworthiness requirements thatoccur in dynamic service compositions and discuss the solutions developed within theproject Aniketos Based on our experiences we will discuss open research challengesand potential opportunities for potential opportunities for applying type systems

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 2

About Me

My Employer SAP AG

Vendor of enterprise software systems

Worldrsquos third largest software vendor

More than 25 industries

63 of the worldrsquos transaction revenuetouches an SAP system

64 422 employees worldwide

Personal Background

Senior ResearcherSecurity Formal Methods Software Engineering

Security Expertsupporting all phases of a SDLC

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 3

The Aniketos ProjectEnable composite services to establish and maintain security and trustworthiness

Goals of the Aniketos platform

Design-time discovery compositionand evaluation threat awareness

Runtime adaptation or change inservice configuration

Runtime monitoring detectionnotification

Two related dimensions

Trustworthiness Reputationperception centralised vsdistributed

Security properties Behaviourcontracts interfaces formalverification

Aniketos Fact-Sheet

EU Integrated Project (IP) FP7 Call 5

Budget euro 139 Mio (euro 96 Mio funding)

42 month (Aug 2010 ndash Feb 2014)

Coordinator Sintef (Norway)

httpwwwaniketoseu

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 4

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Past Service Compositions

ldquo Service a mechanism to enable access to one or more capabilitieswhere the access is provided using a prescribed interface withconstraints and policies as specified by the service description

OASIS Reference Model for Service Oriented Architecture

At least 20 years old

RPCs introduced in 1980sCORBA published in 1991

Motivated by

re-useabilityreliability

Used within organisations

Frameworks considered to beheavy-weight

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 6

The Past Secure Service Compositions

Photo Holger Weinandt

Recall the past

networks were expensive (and slow)only a few people had access tonetworked systems

Security modelnon-technical trust

small numbers of users allowinga personal relationshipsystem operators trust their users

security perimeter

limited accessfirewallscontrolled system access

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 7

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 3: Service Compositions: Curse or Blessing for Security?

About Me

My Employer SAP AG

Vendor of enterprise software systems

Worldrsquos third largest software vendor

More than 25 industries

63 of the worldrsquos transaction revenuetouches an SAP system

64 422 employees worldwide

Personal Background

Senior ResearcherSecurity Formal Methods Software Engineering

Security Expertsupporting all phases of a SDLC

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 3

The Aniketos ProjectEnable composite services to establish and maintain security and trustworthiness

Goals of the Aniketos platform

Design-time discovery compositionand evaluation threat awareness

Runtime adaptation or change inservice configuration

Runtime monitoring detectionnotification

Two related dimensions

Trustworthiness Reputationperception centralised vsdistributed

Security properties Behaviourcontracts interfaces formalverification

Aniketos Fact-Sheet

EU Integrated Project (IP) FP7 Call 5

Budget euro 139 Mio (euro 96 Mio funding)

42 month (Aug 2010 ndash Feb 2014)

Coordinator Sintef (Norway)

httpwwwaniketoseu

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 4

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Past Service Compositions

ldquo Service a mechanism to enable access to one or more capabilitieswhere the access is provided using a prescribed interface withconstraints and policies as specified by the service description

OASIS Reference Model for Service Oriented Architecture

At least 20 years old

RPCs introduced in 1980sCORBA published in 1991

Motivated by

re-useabilityreliability

Used within organisations

Frameworks considered to beheavy-weight

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 6

The Past Secure Service Compositions

Photo Holger Weinandt

Recall the past

networks were expensive (and slow)only a few people had access tonetworked systems

Security modelnon-technical trust

small numbers of users allowinga personal relationshipsystem operators trust their users

security perimeter

limited accessfirewallscontrolled system access

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 7

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 4: Service Compositions: Curse or Blessing for Security?

The Aniketos ProjectEnable composite services to establish and maintain security and trustworthiness

Goals of the Aniketos platform

Design-time discovery compositionand evaluation threat awareness

Runtime adaptation or change inservice configuration

Runtime monitoring detectionnotification

Two related dimensions

Trustworthiness Reputationperception centralised vsdistributed

Security properties Behaviourcontracts interfaces formalverification

Aniketos Fact-Sheet

EU Integrated Project (IP) FP7 Call 5

Budget euro 139 Mio (euro 96 Mio funding)

42 month (Aug 2010 ndash Feb 2014)

Coordinator Sintef (Norway)

httpwwwaniketoseu

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 4

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Past Service Compositions

ldquo Service a mechanism to enable access to one or more capabilitieswhere the access is provided using a prescribed interface withconstraints and policies as specified by the service description

OASIS Reference Model for Service Oriented Architecture

At least 20 years old

RPCs introduced in 1980sCORBA published in 1991

Motivated by

re-useabilityreliability

Used within organisations

Frameworks considered to beheavy-weight

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 6

The Past Secure Service Compositions

Photo Holger Weinandt

Recall the past

networks were expensive (and slow)only a few people had access tonetworked systems

Security modelnon-technical trust

small numbers of users allowinga personal relationshipsystem operators trust their users

security perimeter

limited accessfirewallscontrolled system access

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 7

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 5: Service Compositions: Curse or Blessing for Security?

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Past Service Compositions

ldquo Service a mechanism to enable access to one or more capabilitieswhere the access is provided using a prescribed interface withconstraints and policies as specified by the service description

OASIS Reference Model for Service Oriented Architecture

At least 20 years old

RPCs introduced in 1980sCORBA published in 1991

Motivated by

re-useabilityreliability

Used within organisations

Frameworks considered to beheavy-weight

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 6

The Past Secure Service Compositions

Photo Holger Weinandt

Recall the past

networks were expensive (and slow)only a few people had access tonetworked systems

Security modelnon-technical trust

small numbers of users allowinga personal relationshipsystem operators trust their users

security perimeter

limited accessfirewallscontrolled system access

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 7

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 6: Service Compositions: Curse or Blessing for Security?

The Past Service Compositions

ldquo Service a mechanism to enable access to one or more capabilitieswhere the access is provided using a prescribed interface withconstraints and policies as specified by the service description

OASIS Reference Model for Service Oriented Architecture

At least 20 years old

RPCs introduced in 1980sCORBA published in 1991

Motivated by

re-useabilityreliability

Used within organisations

Frameworks considered to beheavy-weight

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 6

The Past Secure Service Compositions

Photo Holger Weinandt

Recall the past

networks were expensive (and slow)only a few people had access tonetworked systems

Security modelnon-technical trust

small numbers of users allowinga personal relationshipsystem operators trust their users

security perimeter

limited accessfirewallscontrolled system access

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 7

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 7: Service Compositions: Curse or Blessing for Security?

The Past Secure Service Compositions

Photo Holger Weinandt

Recall the past

networks were expensive (and slow)only a few people had access tonetworked systems

Security modelnon-technical trust

small numbers of users allowinga personal relationshipsystem operators trust their users

security perimeter

limited accessfirewallscontrolled system access

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 7

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 8: Service Compositions: Curse or Blessing for Security?

The Present Service Composition

Motivated by business needs

cost-savingsflexibility

Used across organisations

Environment

fast networksmany users

relatively static compositions

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 8

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 9: Service Compositions: Curse or Blessing for Security?

The Present Secure Service CompositionAccess Control

Photo Syohei Arai

Goal

Control access toservices resources (data)

The core

Usuallyusers roles access rights

In special casesdata labelling or information flow

On top

Separation of Duty

Binding of Duty

Delegation

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 9

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 10: Service Compositions: Curse or Blessing for Security?

The Present Secure Service CompositionProtecting Data (and Physical Goods)

Photo Bundesarchiv Bild 183-R0117-0003 CC-BY-SA

Goal

Ensure

confidentialityintegrity (safety)

of data (and goods)

The core

Need-to-Know

Fingerprints

Encryption

Sensors

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 10

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 11: Service Compositions: Curse or Blessing for Security?

The Present Secure Service CompositionCompliance and Additional Requirements

Photo Ralf Roletschek

Many regulated markets

Basel IIIII SoX PCI

HIPAA

Many customer-specific regulations

Own governance to mitigate risks

Own business code of conduct

Fraud detectionprevention

Non-observability

Customers are individually audited

No ldquoone certificate fits allrdquo solution

Security should not hinder business

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 11

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 12: Service Compositions: Curse or Blessing for Security?

The Future Service Composition

Human Resources

(eg SuccessFactors)

CRM

(eg Salesforce)

Expense Management

(eg Concur) Log

Log

Log

Customer

On Premise

Log

Software as a service

complex componentsupdates controlled by provider

Many external services

No central orchestrator

Complex data flows

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 12

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 13: Service Compositions: Curse or Blessing for Security?

The Future Secure Service Composition

We need to ensure the alreadydiscussed requirements

Many additional challenges eg

Customer

ensure compliance in a changingenvironment

Developer

provide secure scalable services

Provider

provide secure offeringsprotect own infrastructureprotect data of customers

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 13

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 14: Service Compositions: Curse or Blessing for Security?

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 15: Service Compositions: Curse or Blessing for Security?

The Aniketos Process

Runtime Design-time

Service providers Service developers

Compose

Service end users

Invoke

Component change Change of threats Change of environment

Adaptrecompose

Provide

bull Discovery and composition support based on trustworthiness security properties and metrics

bull Relevant threat awareness

bull Trust and security monitoring

bull Threat notification

bullSelf-protection bullTrust evaluation bullSecurity validation

bull End user trust assurance and acceptance

bull Identification of responsible party

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 15

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 16: Service Compositions: Curse or Blessing for Security?

Modeling Composition Plans using BPMN

Human-centric tasks

Automated tasks (services)

Orchestration of services

Startend states

Logical control flow (ifandor)

Error states

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 16

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 17: Service Compositions: Curse or Blessing for Security?

Security by ContractAtomic Services

service implementationimport javaxservlethttppublic class Service

protected void doGet(HttpServletRequest reqHttpServletResponse resp) throws IOException

Service Provider Security Contract

Service Security Agreement

Service Customer Security Policy

Ser

vic

eP

rovid

erD

evel

op

erSer

vic

eC

ust

om

er

fullfills Implementation Certification

matches

matches

Contract Matching

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 17

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 18: Service Compositions: Curse or Blessing for Security?

Security by ContractComposed Services

S0

contract S0

policy S0

S1

contract S1

policy S1

S2

contract S2

policy S2

Sn

contract Sn

policy Sn

Service Provider Security ContractC

om

pose

dSer

vic

efullfills

ImplementationCertification

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 18

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 19: Service Compositions: Curse or Blessing for Security?

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 20: Service Compositions: Curse or Blessing for Security?

Secure Implementation of Atomic Services

Check the compliance of atomic service implementations

Human tasks

Define the user interface (eg HTML Java)Create read or update of process variables

Service tasks

Define the business logic (eg Java Web service specific configuration)Create read or update of process variables

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 20

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 21: Service Compositions: Curse or Blessing for Security?

Implementing ldquoContact Travel Service Companyrdquo

package corpacmepublic class SendOrderToTravelAgency implements JavaDelegate Overridepublic void execute(DelegateExecution ex) throws Exception String lastname = (String) exgetVariable(user_lastname)String firstname = (String) exgetVariable(user_firstname)String email = (String) exgetVariable(user_email)String reason = (String) exgetVariable(travel_business_reason)String destination = (String) exgetVariable(travel_destination)String duration = (String) exgetVariable(travel_duration)

Code for accessing the web serviceQName SERVICE_NAME = new QName(httptravelcorp TravelService)URL WSDLURL = new URL(httptravelcorpTravelServiceServiceasmxWSDL)Service travelService = new Service(WSDLURL SERVICE_NAME)ServiceSoap port = travelServicegetServiceSoap()

send order to travel serviceportorderTravelAssistance(firstnamelastnameemailreason

destinationduration)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 21

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 22: Service Compositions: Curse or Blessing for Security?

Implementation Level Reasoning

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 22

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 23: Service Compositions: Curse or Blessing for Security?

The Problem RBAC with Separation of DutyRole-based access control (RBAC)

Subjects are assigned to roles

Permissions assign roles to tasks (resources)

Separation of duty (SoD)

restrict subjects in executing tasks

We analyse

Does the RBAC configurationcomply to the SoD requirements

yes static SoDno dynamic SoD

In case of a compliance violation

change RBAC configurationensure dynamic enforcement of SoD

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 23

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 24: Service Compositions: Curse or Blessing for Security?

Security Verification Module (RBACSoD Check)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 24

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 25: Service Compositions: Curse or Blessing for Security?

Analysing (Dynamic | Static) Separation of Duty

Does the access control enforce a separation of duty constraint

Translate the composition plan to ASLan

hc rbac_ac(Subject Role Task) = CanDoAction(Subject Role Task)- user_to_role(Subject Role) poto(Role Task)

hc poto_T6 = poto(Staff Request Travel)hc poto_T6 = poto(Manager Approve Absence)hc poto_T7 = poto(Manager Approve Budget)

Specify the test goal

attack_state sod_securitySod1_1(Subject0Subject1Instance1Instance2)= executed(Subject0task(Request TravelInstance1))

executed(Subject1task(Approve BudgetInstance2))executed(Subject3task(Approve AbsenceInstance3))ampnot(equal(Subject0Subject1))ampnot(equal(Subject1Subject2))ampnot(equal(Subject2Subject3))

Run the model checker

Translate the analysis result back to BPMN (visualisation)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 25

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 26: Service Compositions: Curse or Blessing for Security?

User Interface for the Service Designer

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 26

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 27: Service Compositions: Curse or Blessing for Security?

Outline

1 (Secure) Service Composition Past Present and Future

2 The Aniketos Approach Overview

3 The Aniketos Approach Exemplary Deep Dive

4 Service Compositions A Curse or Blessing for Security

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 28: Service Compositions: Curse or Blessing for Security?

Why Are Enterprises Moving Services to the Cloud

The shift to the cloud (SaaS) is driven by economical considerations

total cost of ownership

need for adaptability (flexibility)

Core assumption specialised cloud providers

operate systems cheaper (licenses upgrades etc)

achieve higher reliability

provide more flexibility (elasticity features etc)

And security

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 28

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 29: Service Compositions: Curse or Blessing for Security?

Security Chances and Risks of Service Compositions

Chances Challenges

regular updates

XSS SQL injection etc

system administration

misconfiguration

secured data centres

specialises systems

how to trust the provider

data disclosure

new attacks

tenants as attackersproviders as attackers

how to control delegation

subcontracting

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 29

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 30: Service Compositions: Curse or Blessing for Security?

Challenges for Type-based Approaches (in Industry)

Real systems are not build from scratch

existing frameworkslegacy systems

Developers hate to write type annotations

BufferedReader in = new BufferedReader(converter)

we need to advertise

type inferencea concise syntax for typed languages andhelpful error messages

Weaklydynamically typed languages are gaining popularity

light-weight typed based analysis approachestype systems for

well-defined subsets thatcan interact with the whole language (libraries etc)

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 30

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 31: Service Compositions: Curse or Blessing for Security?

Conclusion

ldquo The interesting challenges are still ahead of us

Real systems are large and complex

many programming languages or frameworksmany security technologieshighly distributed

There is a trend towards weakly typed languages

can we provide type-based analysis for such systemscan we provide (strongly) typed alternatives that

provide similar flexibilitycan integrate existing frameworks

Security is more than CIAneeds to be ensured on all levels

implementation level vulnerabilitiesconfiguration errorssecurity frameworksimplementation (authentication crypto)

business-level compliancelegal frameworks

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 31

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 32: Service Compositions: Curse or Blessing for Security?

Thank you for your attentionAny questions or remarks

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security
Page 33: Service Compositions: Curse or Blessing for Security?

References

Achim D Brucker and Isabelle Hang

Secure and compliant implementation of business process-driven systems

In Marcello La Rosa and Pnina Soffer editors Joint Workshop on Security in BusinessProcesses (SBP) volume 132 of Lecture Notes in Business Information Processing (LNBIP)pages 662ndash674 Springer-Verlag 2012

Achim D Brucker Isabelle Hang Gero Luumlckemeyer and Raj Ruparel

SecureBPMN Modeling and enforcing access control requirements in business processes

In ACM symposium on access control models and technologies (SACMAT) pages 123ndash126ACM Press 2012

Achim D Brucker Francesco Malmignati Madjid Merabti Qi Shi and Bo Zhou

A framework for secure service composition

In ASEIEEE International Conference on Information Privacy Security Risk and Trust(PASSAT) IEEE Computer Society 2013

Luca Compagna Pierre Guilleminot and Achim D Brucker

Business process compliance via security validation as a service

In Manuel Oriol and John Penix editors IEEE International Conference on Software TestingVerification and Validation (ICST) pages 455ndash462 IEEE Computer Society 2013

ANIKE OS Service Compositions Curse or Blessing for Security 2013-09-24 33

  • (Secure) Service Composition Past Present and Future
    • The Past
    • Service Composition Present
      • The Aniketos Approach Overview
      • The Aniketos Approach Exemplary Deep Dive
        • Secure Implementation of Atomic Services
        • Analysing Access Control Compliance
          • Service Compositions A Curse or Blessing for Security