The Integration of Corporate Security Strategies in Collaborative Business Processes

被引:14
作者
Badr, Youakim [1 ]
Biennier, Frederique [1 ]
Tata, Samir [2 ]
机构
[1] INSA Lyon, Dept Informat, F-69621 Villeurbanne, France
[2] TELECOM SudParis, TELECOM, CNRS UMR Samovar, F-91011 Evry, France
关键词
Computer security; data processing; distributed information system;
D O I
10.1109/TSC.2010.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In response to increasing economical constraints, enterprise organization has evolved toward new structures such as networked enterprise, supply chains, virtual enterprise, or collaborative business organizations. This structural organization requires the interoperability of business processes (BPs) and information systems. Dealing with interoperability often leads to the deployment of Service-Oriented Architecture (SOA) based on Enterprise Service Bus (ESB) to design agile collaborative BPs and publish and compose new services. In order to protect each partner's own interests, security strategies must be developed and integrated in the service environment. Unfortunately, traditional security approaches deal with security concerns from a technical perspective (i.e., data transmission or authentication, etc.) and do not support end-to-end security in a distributed environment of business services and collaborative processes. In this paper, we attempt to improve end-to-end security by annotating service descriptions with security objectives used to generate convenient quality of protection (QoP) agreements between partners. Conversely, agreements are processed by a dedicated matching module with respect to security requirements and preferences to select business services, and then, compose their appropriate technical security services.
引用
收藏
页码:243 / 254
页数:12
相关论文
共 40 条
[1]   Modeling permissions in a (U/X)ML world [J].
Alam, Muhammad ;
Breu, Ruth ;
Hafner, Michael .
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, :685-+
[2]  
Alberts C., 2001, INTRO OCTAVESM METHO
[3]  
Ali L., 2005, P S EXH ADV PACK MAT
[4]  
Andrieux A., 2007, WEB SERVICES AGREEME
[5]  
[Anonymous], 2011, PETALS ESB OPEN SOUR
[6]  
[Anonymous], 2000, 17799 ISOIEC
[7]  
[Anonymous], **NON-TRADITIONAL**
[8]  
Basin D., 2003, Proceedings 8th ACM Symposium on Access Control Models and Technologies (SACMAT '03), P100, DOI DOI 10.1145/775412.775425
[9]  
Biennier F., 2002, P 3 IFIP WORK C INFR, P11
[10]  
Chabeb Y., 2008, IADIS WWW INT 2008 C, P462