Modeling and Performance Evaluation of a Contract-based Electronic Signature Process

Distributed systems become ubiquitous by allowing users access to a wide range of services at any time, anywhere, and from a variety of devices. In these open environments where there are many opportunities for both fraudulent services and misbehaving clients, service discovery systems are subject to security challenges. Con- trolling services' access is one of the fundamental issues that must be faced in the context of service discovery in distributed and open environments. Therefore, secure accesses and utilization of available services must be ensured for users. In our previ- ous work, a contract-based approach for controlling the service access in a distributed computing context was presented. In this paper, we address the purpose and the usage of digital signature on negotiated electronic queries between a server and clients in ser- vice discovery systems and web service composition. The paper discusses the combined use of Timed Event Graphs and (max, +)- algebra to model, evaluate and optimize the performance of the signature process and client requests validation by a service provider (server). Based on an optimization resource allocation algorithm, an improve- ment study of the quality of service offered to the clients, in terms of waiting times and validation of their requests, is proposed. The results are reported and show the efficiency of the use of the proposed formal tools for performance analysis, evaluation and tuning of the considered process.

[1]  Tobias Gondrom,et al.  Validation and long term verification data for Evidence Records and signed documents , 2010 .

[2]  Thomas Begin,et al.  Higher-order distributional properties in closed queueing networks , 2009, Perform. Evaluation.

[3]  M Yegani,et al.  Online professional networking: an effective interactive tool. , 2009, Poultry science.

[4]  Tarek A. El-Ghazawi,et al.  Analytical modeling and evaluation of On-Chip Interconnects using Network Calculus , 2009, 2009 3rd ACM/IEEE International Symposium on Networks-on-Chip.

[5]  Simon Collart-Dutilleul Réseaux de Petri P-temporels: Modélisation et validation d'exigences temporelles , 2008 .

[6]  Antonio F. Gómez-Skarmeta,et al.  A new fair non-repudiation protocol for secure negotiation and contract signing , 2006, J. Univers. Comput. Sci..

[7]  Ahmed Nait-Sidi-Moh,et al.  Modelling of Process of Electronic Signature with Petri Nets and (Max, Plus) Algebra , 2005, ICCSA.

[8]  Wendell H. Fleming,et al.  Max-Plus Stochastic Processes , 2004 .

[9]  Marek J. Sergot,et al.  Contractual Access Control , 2002, Security Protocols Workshop.

[10]  Israel Ben-Shaul,et al.  Dynamic configuration of access control for mobile components in FarGo , 2001, Concurr. Comput. Pract. Exp..

[11]  C. Adams,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[12]  Marco Ajmone Marsan,et al.  Modelling with Generalized Stochastic Petri Nets , 1995, PERV.

[13]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[14]  Yi Mu,et al.  Certificate-based Signatures Revisited , 2009, J. Univers. Comput. Sci..

[15]  C. Adams,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP) , 2005, RFC.

[16]  B. Shand,et al.  Trust for resource control: self-enforcing automatic rational contracts between computers , 2004 .

[17]  Tarek A. El-Ghazawi,et al.  A self-stabilizing distributed algorithm for spanning tree construction in wireless ad hoc networks , 2003, J. Parallel Distributed Comput..

[18]  Geert Jan Olsder,et al.  Synchronization and Linearity: An Algebra for Discrete Event Systems , 1994 .

[19]  S. Gaubert Theorie des systemes lineaires dans les dioides , 1992 .