System Abuse by Service Composition: Analysis and Prevention