
framework, i.e. the configuration takes place in a model-driven way from which 
executable artifacts are produced. This leaves the engine open to any kind of 
protocols, not only Non-repudiation protocols. 
A first step into this direction could be to integrate a Non-repudiation protocol 
without TTP. Different kinds of protocols need different kinds of primitives. A kind 
of plug-in mechanism would render the architecture more flexible. 
Another case not discussed in this paper is the dispute resolution. Here, a judge has 
to collect evidence from the participants and probably from the TTP. 
Overall, we can say that the model-driven configuration of security requirements 
and protocols in this case offers many possibilities in rendering a system more 
flexible and considering security aspects in an early phase of development. The 
evaluation of the profitability of for such a Protocol Engine with its configurability of 
a lower layer is an interesting open problem for future research. 
References 
1.  Hafner, M., M.M. Alam, and R. Breu. Towards a MOF/QVT-based Domain Architecture 
for Model Driven Security. in Models 2006. 2006. Genova, Italy. 
2.  Hafner, M., et al. Realizing Advanced Security Requirements for Inter-organizational 
Workflows. in eChallenges 2006. 2006. Bacelona, Spain. 
3.  Hafner, M., et al. Sectet - An Extensible Framework for the Realization of Secure Inter-
Organizational Workflows. in WOSIS 2006. 2006. Paphos, Cyprus: INSTICC Press. 
4.  Bartel, M., et al. XML-Signature Syntax and Processing.  2002  [cited 2007 19.01.]; 
Available from: http://www.w3.org/TR/xmldsig-core/. 
5.  SOAP Version 1.2 Part 1: Messaging Framework.  2003  [cited 2007 19.01.]; Available 
from: http://www.w3.org/TR/soap/. 
6. Hada, S. SOAP security extensions: digital signature.  2001  [cited 2007 18.01.]; Available 
from: http://www-128.ibm.com/developerworks/library/ws-soapsec/. 
7.  Freier, A., P. Karlton, and P. Kocher, The SSL Protocol Version 3.0. 1996. 
8. Gravengaard, E., Web Services Security: Non-Repudiation. 2003. 
9.  Zhou, J. and D. Gollmann, A Fair Non-repudiation Protocol. 1995: University of London, 
Royal Holloway, Department of Computer Science. 
10. Markowitch, O. and Y. Roggeman, Probabilistic non-repudiation without trusted third 
party. Second Conference on Security in Communication Networks, 1999. 99. 
11. Kremer, S., O. Markowitch, and J. Zhou, An intensive survey of fair non-repudiation 
protocols. Computer Communications, 2002. 25(17): p. 1606-1621. 
12. Graham, S., et al. Web Services Resource 1.2.  2006  [cited 2007 19.01.]; Available from: 
http://docs.oasis-open.org/wsrf/wsrf-ws_resource-1.2-spec-os.pdf. 
 
72