WSA. We can outline how we can address the 
implementation of this model for each specific 
scenario using Web services standards. The central 
point in this approach is that both service consumer 
and provider have to define their respective security 
policies related to WSbS*-RM. Expression of these 
policies can be based on WS-Policy. On the other 
hand, PSO, PSC and PSS can be transmitted in a 
secure manner using WS-Security standard. In order 
to define PS*-certs, XML-Dsig, XML-Encryption, 
SAML and XML-Schema enable security and 
mechanisms to ensure all security issues described. 
Finally UDDI, could be used to get a reference for 
the identity of each WSbS* actors. 
5 CONCLUSIONS 
The main contribution of our paper is the definition 
of a conceptual framework for the assurance of 
integral code and state security in SOA. It is a 
framework where not only the message security is 
considered, but also the security of the code that 
processes it. Besides, we propose an extra level of 
security in a service interaction considering both 
code and state. Finally, an incremental model of 
security based on certificates issued by each model 
actor provides a means for ensure security and 
achieve a trusted environment.  
Our main lines of research are: (1) to work on 
the implementation of the model in several real 
world scenarios; (2) to improve security between 
state and methods using secret sharing techniques 
(as commented in section 3.3); (3) we have realized 
that both code and state share similar actors. This 
has suggested us a new line of research for the 
definition of a meta-model that would describe 
uniformly the structure and the behaviour of the 
state and the code security models. 
ACKNOWLEDGEMENTS 
Partially supported by project FOMENTA 2008/01 
of the Comunidad Autónoma de La Rioja. 
REFERENCES 
Bhargavan, K., Fournet, C., Gordon, A.D., 2004. 
Verifying policy-based security for web services. In 
Proceedings of the 11th ACM conference on 
Computer and communications security, October 2004 
Birman, K.P., 2004. Like it or not, web services are 
distributed objects. In Communications of the ACM, 
december 2004 
Chang, B-Y. E., Chlipala, A., Necula, G.C., Schneck, 
R.R:, 2005. The open verifier framework for 
foundational verifiers. In Proceedings of the 2005 
ACM SIGPLAN international workshop on Types in 
languages design and implementation, January 2005 
Claessens, J., Preneel, B., Vandewalle, J., 2003. (How) 
can mobile agents do secure electronic transactions on 
untrusted hosts? A survey of the security issues and 
the current solutions, ACM Transactions on Internet 
Technology (TOIT), February 2003 
European Project, 2006. Security of Software and Services 
for Mobile Systems,http://www.s3ms.org, March 
2006. 
Franz, M., Chandra, D., Gal, A., Haldar, V., Reig, F., 
Wang, N., 2003. A portable Virtual Machine target for 
Proof-Carrying Code. In Proceedings of the 2003 
workshop on Interpreters, virtual machines and 
emulators, June 2003 
Foster, I., Parastatidis, S.,Watson, P., Mckeown, M., 2008. 
How do I model state?: Let me count the ways. In 
Communications of the ACM, september 2008. 
Gutiérrez, C., Fernández Medina, E. and Piattini, M., 
2005. Web Services Enterprise Security Architecture: 
A Case Study. SWS'05, november 11, 2005 
Lange, D.B., Oshima, M., 1999. Seven good reasons for 
mobile agents”, Communications of the ACM, v.42 
n.3, p.88-89, March 1999 
Miao, C.,Wei, R., 2003. Secret Sharing for Mobile Agent 
Cryptography. In Communication Networks and 
Services Research Conference, Session B 
Rodríguez Priego,E., García Izquierdo,F.J., 2007. 
Securing Code in Services Oriented Architecture, 
ICWE07. LNCS 4607, pp. 450-555. Springer-Verlag 
2007. 
Rubin, A.D., Geer Jr., D.E., 1998. Mobile Code Security, 
IEEE Internet Computing, vol. 02, no. 6, pp. 30-34, 
Nov/Dec, 1998 
Sekar, R., Ramakrishnan, C. R., Ramakrishnan, I. V., 
Smolka, S. A., 2001. Model-Carrying Code (MCC): a 
new paradigm for mobile-code security. In 
Proceedings of the 2001 workshop on New security 
paradigms, September 2001 
Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, 
P., 2006. Externally verifiable code execution. In 
Communications of the ACM, september 2006. 
Shamir, A., 1979. How to share a secret. Commun. ACM 
22, 11 (Nov. 1979), 612-613 
Whitman, M.E., 2003. Enemy At The Gate: Threats To 
Information Security. In Communications of the 
ACM, August 2003 
OASIS, 2006. Reference Model for SOA v1.0  
OASIS, 2008. Reference Architecture for SOA v1.0 
Vogels, W., 2003. Web services are not distributed 
objects. In Internet Computing, Dec. 2003 
W3C, 2004. Web Services Architecture 
INTEGRAL SECURITY MODEL FOR THE EXCHANGE OF OBJECTS IN SERVICES ORIENTED ARCHITECTURE
65