By Topic

Online detection of web choreography misuses

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Gunestas, M. ; George Mason Univ., Fairfax, VA, USA ; Wijesekera, D.

Web service choreographies can be misused or abused in two different ways. The first is to exploit the underlying choreography to attack web services, that we call service misuses. Instantiation flooding is one such attack. The second is using web service choreographies to conduct illegal businesses, that we call business misuses. Ponzi and Pyramidal schemes belong in this second category. Due to the web service interdependencies created in choreographed web services both these kinds are difficult to detect. We show an online detection system that would generate alerts of both these kinds of misuses.

Published in:

Collaborative Computing: Networking, Applications and Worksharing, 2009. CollaborateCom 2009. 5th International Conference on

Date of Conference:

11-14 Nov. 2009