The Community for Technology Leaders
Green Image
Issue No. 03 - July-September (2011 vol. 4)
ISSN: 1939-1374
pp: 230-242
Lutz Lowis , Albert-Ludwig University of Freiburg, Freiburg
Rafael Accorsi , Albert-Ludwig University of Freiburg, Freiburg
Business processes and services can more flexibly be combined when based upon standards. However, such flexible compositions practically always contain vulnerabilities, which imperil the security and dependability of processes. Vulnerability management tools require patterns to find or monitor vulnerabilities. Such patterns have to be derived from vulnerability types. Existing analysis methods such as attack trees and FMEA result in such types, yet require much experience and provide little guidance during the analysis. Our main contribution is ATLIST, a new vulnerability analysis method with improved transferability. Especially in service-oriented architectures, which employ a mix of established web technologies and SOA-specific standards, previously observed vulnerability types and variations thereof can be found. Therefore, we focus on the detection of known vulnerability types by leveraging previous vulnerability research. A further contribution in this respect is the, to the best of our knowledge, most comprehensive compilation of vulnerability information sources to date. We present the method to search for vulnerability types in SOA-based business processes and services. Also, we show how patterns can be derived from these types, so that tools can be employed. An additional contribution is a case study, in which we apply the new method to an SOA-based business process scenario.
Service security and dependability, vulnerability analysis, SOA-based business processes, vulnerability classification.

L. Lowis and R. Accorsi, "Vulnerability Analysis in SOA-Based Business Processes," in IEEE Transactions on Services Computing, vol. 4, no. , pp. 230-242, 2010.
90 ms
(Ver 3.3 (11022016))