SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
An AHP-based Framework
for Quality and Security
Evaluation
V. Casola, A.R. Fasolino, N. Mazzocca, P. Tramontana

Dipartimento di Informatica e Sistemistica
Universita' degli Studi di Napoli, Federico II
Naples, Italy

{casolav, fasolino, n.mazzocca, ptramont}@unina.it
Rationale
 Context and open issues
 Our approach to quality and security
 evaluation
 Methodology
   Policy Formalization
   Evaluation technique
 Applicability in Web Service Architectures
 Conclusions and Future Works
Context: service cooperation, a
security point of view
  Service Oriented Architectures are capable of
  intelligent interaction and are able to discover and
  compose themselves into more complex services;

  The open issue is: how to guarantee the “quality and
  security” of a service built at run-time in a potential
  un-trusted domain?
How a Customer can choose the Web Service that better
fits his “quality” requirements?



                                    Service
                                   Provider1


                                                Quality
           Service                              Offer 1
          Customer             ?      …

                     Quality        Service
                     Request       Provider n


                                                 Quality
                                                 Offer n




                                                           4
Our approach to quality/security
evaluation
  Actually, these problems are faced by explicit
  agreements among services:
     Each service defines its own Service Level Agreement
     and Security Policy and publishes them in a public
     document;
     People from the various organization that want to
     cooperate, manually evaluate the different SLAs and
     decide to agree or not.
  SLA and Policies are expressed by means of a free
  text document; they usually contain provisions on
  the “quality” of services and on “security”
  mechanisms adopted, they are used to decide to
  extend trust to other services;
  These documents are mostly manually evaluated.
Security evaluation Methodology
  We are working on different methodologies to:
    Express quality/security through a semi-formal
    and not ambiguous model; the chosen
    formalization must be “easy to adopt” for
    technical and organizational people;
    Evaluate the quality/security level that a
    security infrastructure is able to guarantee by
    aggregating the security associated to all policy
    provisions (multidecision approach).
    Compare different services according to the
    measured quality/security level.
The proposed approach
•    Models are needed to formally express the Quality
     and security of Web Services (quality of protection,
     QoS, security and so on) requested by Customers
     and offered by Providers;
1.   We defined a quality meta-model and formally
     express Quality as an instance of the meta-model;
2.   We investigated the adoption of a decision
     framework based on AHP (Analytic Hierarchy
     Process) proposed by Saaty for Quality evaluation;
The Quality Meta-Model
                                         • Quality Characteristic: any quality requirements,
     Quality Model                       such as Performance, Security, Cost, Maintainability

            1..n                         •Characteristics may be arranged in a hierarchy
     Characteristic +SubCharacteristic
                     0..n                (Measurable Characteristics are the leaves)
                0..1
                                         • Measurable Characteristic: a Quality Characteristic
Measurable Characteristic                that can directly be measured

             1..n
       Component                Quality Characteristic: Efficiency
                                    oQuality Characteristic: Time Behavior
             1..n
                                         Quality Characteristic: Response Time
           1                                 •Measurable Quality Characteristic: Average
   Measurement Unit                          Response Time
                                              Measurable Quality Characteristic: Standard
                                             deviation
                                              Measurable Quality Characteristic: Maximum8
                                             response time
The Analytical Hierarchy Process
1.      The decision model design activity:
     1.    Weight Assignment step: the relative
           importance of the characteristics is rated;    A security expert
     2.    Clustering step: for each measurable           designs the
           characteristic, the sets of values that will   decision model
           be considered equivalent for the aims of
           the evaluation are defined;
     3.    Rating Step: each set is associated to a
           rating value;                                  The decision
                                                          maker evaluates
                                                          the quality by
2.    The decision making activity: to compare the        applying the
      quality of an offered service (formalised in a      decision model
      Quality Offer Model) against requestor needs                            9

      (formalised in a Quality Request Model)
Building the decisional model:
   Step 1: Weight Assignment
For each Characteristic that is not directly measurable,
the decision process designer will estimate the relative Intensity of Importance of any
pair of its n Sub-Characteristics, by defining a matrix of nxn
                                                                Response        Average    Standard     Maximum
Intensity of Importance and its interpretation
                                                                Time            Response   Deviation    of Response
    Intensity of        Interpretation                                          Time       Response     Time
    Importance                                                                             Time

         1              Equal Importance                        Average         1          3            7
                                                                Response Time
         3              Moderate                 1. Build the   Standard        1/3        1            5
                        Importance               Comparison     Deviation
         5              Strong Importance        matrix         Response Time
                                                                Maximum         1/7        1/5          1
         7              Very strong                             Response Time
                        Importance
         9              Extreme Importance
                                                                                      m(i, j) = 1 m( j,i) ∀i, j
                                                      2. Normalize                    m(i,i) = 1 ∀i
                                                      The matrix                                                  10
Building the decisional model:
Step 1: Weight Assignment (cont.)

                                     2. Normalize                                       n
                                     The matrix                    m'(i, j) = m(i, j)   ∑ m(h, j)   ∀i,j
                                                                                        h=1




                                                Average    Standard        Maximum       Weights
                                                Response   Deviation       Response
                                                Time       Response        Time
Characteristic Weights                                     Time
are assigned by comparing
                             Average Response   21/31      15/21           7/13          0.64
their relative importance:   Time
                             Standard           7/31       5/21            5/13          0.28
                             Deviation
         n
             m' (i, k )
 w(i ) = ∑
                             Response Time
                        ∀i   Maximum            3/31       1/21            1/13          0.07
        k =1     n           Response Time


                                                                                                           11
Building the decisional model:
Step 2: Clustering
We need an Utility Function to ORDER the possible values on the basis of relative (and
not absolute) preferences (LOCAL SECURITY LEVELS).

In general, an Utility function R assigns ordered values (of utility) to members of a
set: given two values x and y of the set, if x is preferred to y then R(x)> R(y).




Example: Average Response Time characteristic

 R = Offered_value / Requested_value

   Possible Solutions are                     R < 0.5 (very fast response);
   clustered in three levels:                 0.5≤ R <1 (sufficiently fast response);
                                              1≤ R <2 (quite slow response).            12
Building the decisional model:
 Step 3: Rating
After clustering each possible value, we need to rate such clusters according their goodness


  Intensity of Goodness and its                Ratings are assigned to clusters by
          interpretation                       comparing their relative Goodness
 Intensity of    Interpretation
  Goodness                                                   R<0.5       0.5≤R<1     1≤R<2     Rating

      1          Equivalent                   R < 0.5           1             3         5       0.63

      3          Moderately                   0.5≤R<1           1/3           1         3       0.26
                 better                       1≤ R<2            1/5          1/3        1       0.11
      5          Strongly better
      7          Very strongly
                 better                                                             This is the relative
                                                          ⎧0.63 if     R < 0.5
      9          Extremely better
                                    Satisfaction S (R ) = ⎪0.26 if                  rate/evaluation
                                                          ⎨           0.5 ≤ R < 1
                                    Function Ssc(R)       ⎪                          of a cluster
                                                          ⎩0.11 if    1≤ R < 2
                                                                                                   13
The Decision Making Activity
The Quality of different Web Services is compared by evaluating:
    1. a Satisfaction Function for each Measurable Characteristic.
    2. a Satisfaction Function for each non-Measurable Characteristic:


            Sc (request,offer) =     ∑w         sc   Ssc (request,offer)
                                   sc ∈C (c )




  A non measurable characteristic ( c ),                 All measurable sub-characteristic of ( c )
  For example: Confidentiality                           denoted sc are weighted and summed

                                                         For example: (Encryption Alghoritm,
                                                         KeyLenght, KeyProtection, )     14
The Decision Making Activity (cont.)

3. the Overall Satisfaction Function:



             S(request,offer) =         ∑ w S (request,offer)
                                               c c
                                  c ∈Characteristic




      The Web Service with the greater
     Satisfaction Function value is chosen
                                                                15
Application of the evaluation model: evaluating
measurable and not-measurable characteristics



                        SIntegrity(Customer,Provider1)=
                                0.12*0.8+0.12*0.88+0.38*0.75+0.38*0.75=0.77

                        SIntegrity(Customer,Provider2)=
                                0.12*0.8+0.12*0.88+0.38*0.19+0.38*0.06=0.30


                        SResponseTime(Customer,Provider1)=
                             0.64*0.26+0.07*0.75+0.28*0.07=0.24


                        SResponseTime(Customer,Provider2)=
                             0.64*0.11+0.07*0.25+0.28*0.25=0.16
Application of the evaluation model:
Overall evaluation
 Finally we evaluate the overall satisfaction function (GLOBAL SECURITY LEVEL)




 The first provider will be chosen on the basis of the provided security level
An idea on how to automatically enforce the
evaluation: A reference architecture




                                 V.Casola et al.
                                 An Architectural Model for Trusted Domains in Web
                                 Services
                                 Journal of Information Assurance and Security 2 (2006)
Conclusions and Future work
 We are working on methodologies to automatically
 evaluate quality and security provided by an internet
 service on the basis of the published policies;
 The AHP methodology allows to address measurable
 and not-measurable quality and security aspects in a
 unifying way and propose an evaluation model;
 We are going to integrate such methodology in the
 TRUMAN architecture and compare with existing
 ones.

Más contenido relacionado

Similar a An AHP-based Framework for Quality and Security Evaluation

Gage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample SlidesGage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample SlidesScott Munger
 
Ahmad measuremenr reliability and validity
Ahmad measuremenr reliability and validityAhmad measuremenr reliability and validity
Ahmad measuremenr reliability and validityAhd Ryn
 
7 qc tools training material[1]
7 qc tools training material[1]7 qc tools training material[1]
7 qc tools training material[1]gurmukh singh
 
Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis Deependra Pal
 
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...extentconf Tsoy
 
How a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project SuccessHow a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project SuccessIosif Itkin
 
Use of R in Actuarial Works
Use of R in Actuarial WorksUse of R in Actuarial Works
Use of R in Actuarial Works基晴 出井
 
2007 03-16 modeling and static analysis of complex biological systems dsr
2007 03-16 modeling and static analysis of complex biological systems dsr2007 03-16 modeling and static analysis of complex biological systems dsr
2007 03-16 modeling and static analysis of complex biological systems dsrDebora Da Rosa
 
Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)will wade
 
2011 Crowdsourcing Search Evaluation
2011 Crowdsourcing Search Evaluation2011 Crowdsourcing Search Evaluation
2011 Crowdsourcing Search EvaluationBrian Johnson
 
Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success TEST Huddle
 
TAO DAYS - Challenges of Modern Computer Based Assessment
TAO DAYS - Challenges of Modern Computer Based AssessmentTAO DAYS - Challenges of Modern Computer Based Assessment
TAO DAYS - Challenges of Modern Computer Based AssessmentOpen Assessment Technologies
 
Gqm paper
Gqm paperGqm paper
Gqm paperinandhu
 
Quantitative Research Process
Quantitative Research ProcessQuantitative Research Process
Quantitative Research ProcessAIMS Education
 
Value of Non-Functional Qualitites of Cloud Storage
Value of Non-Functional Qualitites of Cloud StorageValue of Non-Functional Qualitites of Cloud Storage
Value of Non-Functional Qualitites of Cloud StorageDr.-Ing. Michael Menzel
 

Similar a An AHP-based Framework for Quality and Security Evaluation (20)

Gage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample SlidesGage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample Slides
 
Ahmad measuremenr reliability and validity
Ahmad measuremenr reliability and validityAhmad measuremenr reliability and validity
Ahmad measuremenr reliability and validity
 
Measurement terms
Measurement termsMeasurement terms
Measurement terms
 
Quantitative Design Tools
Quantitative Design ToolsQuantitative Design Tools
Quantitative Design Tools
 
7 qc tools training material[1]
7 qc tools training material[1]7 qc tools training material[1]
7 qc tools training material[1]
 
Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis
 
Conjoint Analysis
Conjoint AnalysisConjoint Analysis
Conjoint Analysis
 
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
 
How a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project SuccessHow a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project Success
 
Use of R in Actuarial Works
Use of R in Actuarial WorksUse of R in Actuarial Works
Use of R in Actuarial Works
 
2007 03-16 modeling and static analysis of complex biological systems dsr
2007 03-16 modeling and static analysis of complex biological systems dsr2007 03-16 modeling and static analysis of complex biological systems dsr
2007 03-16 modeling and static analysis of complex biological systems dsr
 
IM426 3A G5.ppt
IM426 3A G5.pptIM426 3A G5.ppt
IM426 3A G5.ppt
 
Project Management - Introduction
Project Management - IntroductionProject Management - Introduction
Project Management - Introduction
 
Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)
 
2011 Crowdsourcing Search Evaluation
2011 Crowdsourcing Search Evaluation2011 Crowdsourcing Search Evaluation
2011 Crowdsourcing Search Evaluation
 
Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success
 
TAO DAYS - Challenges of Modern Computer Based Assessment
TAO DAYS - Challenges of Modern Computer Based AssessmentTAO DAYS - Challenges of Modern Computer Based Assessment
TAO DAYS - Challenges of Modern Computer Based Assessment
 
Gqm paper
Gqm paperGqm paper
Gqm paper
 
Quantitative Research Process
Quantitative Research ProcessQuantitative Research Process
Quantitative Research Process
 
Value of Non-Functional Qualitites of Cloud Storage
Value of Non-Functional Qualitites of Cloud StorageValue of Non-Functional Qualitites of Cloud Storage
Value of Non-Functional Qualitites of Cloud Storage
 

Más de Porfirio Tramontana

An Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfAn Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfPorfirio Tramontana
 
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Porfirio Tramontana
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationPorfirio Tramontana
 
A technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsA technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsPorfirio Tramontana
 
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Porfirio Tramontana
 
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Porfirio Tramontana
 
Web Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSEWeb Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSEPorfirio Tramontana
 
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Porfirio Tramontana
 
Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Porfirio Tramontana
 
Reverse Engineering Web Applications
Reverse Engineering Web ApplicationsReverse Engineering Web Applications
Reverse Engineering Web ApplicationsPorfirio Tramontana
 
Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Porfirio Tramontana
 
Improving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindImproving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindPorfirio Tramontana
 
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingTechniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingPorfirio Tramontana
 
Comprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolComprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolPorfirio Tramontana
 
A GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingA GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingPorfirio Tramontana
 
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Porfirio Tramontana
 
Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Porfirio Tramontana
 
Using GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsUsing GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsPorfirio Tramontana
 
A Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsA Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsPorfirio Tramontana
 
DynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionDynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionPorfirio Tramontana
 

Más de Porfirio Tramontana (20)

An Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfAn Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdf
 
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing Automation
 
A technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsA technique for parallel gui testing of android applications
A technique for parallel gui testing of android applications
 
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
 
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
 
Web Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSEWeb Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSE
 
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
 
Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach
 
Reverse Engineering Web Applications
Reverse Engineering Web ApplicationsReverse Engineering Web Applications
Reverse Engineering Web Applications
 
Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications
 
Improving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindImproving Usability of Web Pages for Blind
Improving Usability of Web Pages for Blind
 
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingTechniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications Testing
 
Comprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolComprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA Tool
 
A GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingA GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application Testing
 
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
 
Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications
 
Using GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsUsing GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android Apps
 
A Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsA Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android Applications
 
DynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionDynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application Comprehension
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

An AHP-based Framework for Quality and Security Evaluation

  • 1. An AHP-based Framework for Quality and Security Evaluation V. Casola, A.R. Fasolino, N. Mazzocca, P. Tramontana Dipartimento di Informatica e Sistemistica Universita' degli Studi di Napoli, Federico II Naples, Italy {casolav, fasolino, n.mazzocca, ptramont}@unina.it
  • 2. Rationale Context and open issues Our approach to quality and security evaluation Methodology Policy Formalization Evaluation technique Applicability in Web Service Architectures Conclusions and Future Works
  • 3. Context: service cooperation, a security point of view Service Oriented Architectures are capable of intelligent interaction and are able to discover and compose themselves into more complex services; The open issue is: how to guarantee the “quality and security” of a service built at run-time in a potential un-trusted domain?
  • 4. How a Customer can choose the Web Service that better fits his “quality” requirements? Service Provider1 Quality Service Offer 1 Customer ? … Quality Service Request Provider n Quality Offer n 4
  • 5. Our approach to quality/security evaluation Actually, these problems are faced by explicit agreements among services: Each service defines its own Service Level Agreement and Security Policy and publishes them in a public document; People from the various organization that want to cooperate, manually evaluate the different SLAs and decide to agree or not. SLA and Policies are expressed by means of a free text document; they usually contain provisions on the “quality” of services and on “security” mechanisms adopted, they are used to decide to extend trust to other services; These documents are mostly manually evaluated.
  • 6. Security evaluation Methodology We are working on different methodologies to: Express quality/security through a semi-formal and not ambiguous model; the chosen formalization must be “easy to adopt” for technical and organizational people; Evaluate the quality/security level that a security infrastructure is able to guarantee by aggregating the security associated to all policy provisions (multidecision approach). Compare different services according to the measured quality/security level.
  • 7. The proposed approach • Models are needed to formally express the Quality and security of Web Services (quality of protection, QoS, security and so on) requested by Customers and offered by Providers; 1. We defined a quality meta-model and formally express Quality as an instance of the meta-model; 2. We investigated the adoption of a decision framework based on AHP (Analytic Hierarchy Process) proposed by Saaty for Quality evaluation;
  • 8. The Quality Meta-Model • Quality Characteristic: any quality requirements, Quality Model such as Performance, Security, Cost, Maintainability 1..n •Characteristics may be arranged in a hierarchy Characteristic +SubCharacteristic 0..n (Measurable Characteristics are the leaves) 0..1 • Measurable Characteristic: a Quality Characteristic Measurable Characteristic that can directly be measured 1..n Component Quality Characteristic: Efficiency oQuality Characteristic: Time Behavior 1..n Quality Characteristic: Response Time 1 •Measurable Quality Characteristic: Average Measurement Unit Response Time Measurable Quality Characteristic: Standard deviation Measurable Quality Characteristic: Maximum8 response time
  • 9. The Analytical Hierarchy Process 1. The decision model design activity: 1. Weight Assignment step: the relative importance of the characteristics is rated; A security expert 2. Clustering step: for each measurable designs the characteristic, the sets of values that will decision model be considered equivalent for the aims of the evaluation are defined; 3. Rating Step: each set is associated to a rating value; The decision maker evaluates the quality by 2. The decision making activity: to compare the applying the quality of an offered service (formalised in a decision model Quality Offer Model) against requestor needs 9 (formalised in a Quality Request Model)
  • 10. Building the decisional model: Step 1: Weight Assignment For each Characteristic that is not directly measurable, the decision process designer will estimate the relative Intensity of Importance of any pair of its n Sub-Characteristics, by defining a matrix of nxn Response Average Standard Maximum Intensity of Importance and its interpretation Time Response Deviation of Response Intensity of Interpretation Time Response Time Importance Time 1 Equal Importance Average 1 3 7 Response Time 3 Moderate 1. Build the Standard 1/3 1 5 Importance Comparison Deviation 5 Strong Importance matrix Response Time Maximum 1/7 1/5 1 7 Very strong Response Time Importance 9 Extreme Importance m(i, j) = 1 m( j,i) ∀i, j 2. Normalize m(i,i) = 1 ∀i The matrix 10
  • 11. Building the decisional model: Step 1: Weight Assignment (cont.) 2. Normalize n The matrix m'(i, j) = m(i, j) ∑ m(h, j) ∀i,j h=1 Average Standard Maximum Weights Response Deviation Response Time Response Time Characteristic Weights Time are assigned by comparing Average Response 21/31 15/21 7/13 0.64 their relative importance: Time Standard 7/31 5/21 5/13 0.28 Deviation n m' (i, k ) w(i ) = ∑ Response Time ∀i Maximum 3/31 1/21 1/13 0.07 k =1 n Response Time 11
  • 12. Building the decisional model: Step 2: Clustering We need an Utility Function to ORDER the possible values on the basis of relative (and not absolute) preferences (LOCAL SECURITY LEVELS). In general, an Utility function R assigns ordered values (of utility) to members of a set: given two values x and y of the set, if x is preferred to y then R(x)> R(y). Example: Average Response Time characteristic R = Offered_value / Requested_value Possible Solutions are R < 0.5 (very fast response); clustered in three levels: 0.5≤ R <1 (sufficiently fast response); 1≤ R <2 (quite slow response). 12
  • 13. Building the decisional model: Step 3: Rating After clustering each possible value, we need to rate such clusters according their goodness Intensity of Goodness and its Ratings are assigned to clusters by interpretation comparing their relative Goodness Intensity of Interpretation Goodness R<0.5 0.5≤R<1 1≤R<2 Rating 1 Equivalent R < 0.5 1 3 5 0.63 3 Moderately 0.5≤R<1 1/3 1 3 0.26 better 1≤ R<2 1/5 1/3 1 0.11 5 Strongly better 7 Very strongly better This is the relative ⎧0.63 if R < 0.5 9 Extremely better Satisfaction S (R ) = ⎪0.26 if rate/evaluation ⎨ 0.5 ≤ R < 1 Function Ssc(R) ⎪ of a cluster ⎩0.11 if 1≤ R < 2 13
  • 14. The Decision Making Activity The Quality of different Web Services is compared by evaluating: 1. a Satisfaction Function for each Measurable Characteristic. 2. a Satisfaction Function for each non-Measurable Characteristic: Sc (request,offer) = ∑w sc Ssc (request,offer) sc ∈C (c ) A non measurable characteristic ( c ), All measurable sub-characteristic of ( c ) For example: Confidentiality denoted sc are weighted and summed For example: (Encryption Alghoritm, KeyLenght, KeyProtection, ) 14
  • 15. The Decision Making Activity (cont.) 3. the Overall Satisfaction Function: S(request,offer) = ∑ w S (request,offer) c c c ∈Characteristic The Web Service with the greater Satisfaction Function value is chosen 15
  • 16. Application of the evaluation model: evaluating measurable and not-measurable characteristics SIntegrity(Customer,Provider1)= 0.12*0.8+0.12*0.88+0.38*0.75+0.38*0.75=0.77 SIntegrity(Customer,Provider2)= 0.12*0.8+0.12*0.88+0.38*0.19+0.38*0.06=0.30 SResponseTime(Customer,Provider1)= 0.64*0.26+0.07*0.75+0.28*0.07=0.24 SResponseTime(Customer,Provider2)= 0.64*0.11+0.07*0.25+0.28*0.25=0.16
  • 17. Application of the evaluation model: Overall evaluation Finally we evaluate the overall satisfaction function (GLOBAL SECURITY LEVEL) The first provider will be chosen on the basis of the provided security level
  • 18. An idea on how to automatically enforce the evaluation: A reference architecture V.Casola et al. An Architectural Model for Trusted Domains in Web Services Journal of Information Assurance and Security 2 (2006)
  • 19. Conclusions and Future work We are working on methodologies to automatically evaluate quality and security provided by an internet service on the basis of the published policies; The AHP methodology allows to address measurable and not-measurable quality and security aspects in a unifying way and propose an evaluation model; We are going to integrate such methodology in the TRUMAN architecture and compare with existing ones.