Adapting Workflows Using Generic Schemas: Application to the Security of Business Processes

Ronan-Alexandre Cherrueau, Mario Südholt, O. Chebaro
{"title":"Adapting Workflows Using Generic Schemas: Application to the Security of Business Processes","authors":"Ronan-Alexandre Cherrueau, Mario Südholt, O. Chebaro","doi":"10.1109/CloudCom.2013.75","DOIUrl":null,"url":null,"abstract":"Existing approaches to the adaptation of workflows over Web services fall short in two respects. First, they only provide, if ever, limited means for taking into account the execution history of a workflow. Second, they do not support adaptations that require modifications not only at the service composition level but also at the levels of interceptors and service implementations. This is particular problematic for the enforcement of security properties over workflows: enforcing authorization properties, for instance, frequently requires execution contexts to be defined and modifications to be applied at all these abstraction levels of Web services. We present two main contributions in this context. First, we introduce workflow adaptation schemas (WAS), a new notion of generic protocol-based workflow adapters. WAS enable the declarative definition of adaptations involving complex service compositions and implementations. Second, we present two real-world security issues related to the use of OAuth 2.0, a recent and widely used framework for the authorization of resource accesses. As we motivate, these security issues require history-based adaptations over different abstraction levels of services. We then show how to resolve these issues using WAS.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CloudCom.2013.75","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Existing approaches to the adaptation of workflows over Web services fall short in two respects. First, they only provide, if ever, limited means for taking into account the execution history of a workflow. Second, they do not support adaptations that require modifications not only at the service composition level but also at the levels of interceptors and service implementations. This is particular problematic for the enforcement of security properties over workflows: enforcing authorization properties, for instance, frequently requires execution contexts to be defined and modifications to be applied at all these abstraction levels of Web services. We present two main contributions in this context. First, we introduce workflow adaptation schemas (WAS), a new notion of generic protocol-based workflow adapters. WAS enable the declarative definition of adaptations involving complex service compositions and implementations. Second, we present two real-world security issues related to the use of OAuth 2.0, a recent and widely used framework for the authorization of resource accesses. As we motivate, these security issues require history-based adaptations over different abstraction levels of services. We then show how to resolve these issues using WAS.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用通用模式调整工作流:业务流程安全性的应用程序
通过Web服务调整工作流的现有方法在两个方面存在不足。首先,它们只提供了有限的方法来考虑工作流的执行历史。其次,它们不支持不仅需要在服务组合级别,而且需要在拦截器和服务实现级别进行修改的调整。对于在工作流上实施安全属性来说,这是一个特别的问题:例如,实施授权属性经常需要定义执行上下文,并在所有这些Web服务抽象级别上应用修改。在这方面,我们提出了两个主要贡献。首先,我们介绍了工作流适应模式(WAS),这是一种基于通用协议的工作流适配器的新概念。WAS支持涉及复杂服务组合和实现的自适应的声明式定义。其次,我们提出了两个与使用OAuth 2.0相关的现实安全问题,OAuth 2.0是最近广泛使用的资源访问授权框架。当我们进行激励时,这些安全问题需要对不同抽象级别的服务进行基于历史的调整。然后我们将展示如何使用WAS解决这些问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Feasibility Study of Host-Level Contention Detection by Guest Virtual Machines Porting Grid Applications to the Cloud with Schlouder Towards Data Handling Requirements-Aware Cloud Computing Providing Desirable Data to Users When Integrating Wireless Sensor Networks with Mobile Cloud MELA: Monitoring and Analyzing Elasticity of Cloud Services
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1