Business Process Compliance via Security Validation as a Service

被引:7
作者
Compagna, Luca [1 ]
Guilleminot, Pierre [1 ]
Brucker, Achim D. [2 ]
机构
[1] SAP Res Sophia Antipolis, Mougins, France
[2] SAP AG, Karlsruhe, Germany
来源
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2013) | 2013年
关键词
Validation; Security; Business Process Management; PROCESS MODELS; BPMN; REQUIREMENTS;
D O I
10.1109/ICST.2013.63
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern enterprise systems are often process-based, i.e., they allow for the direct execution of business processes that are specified in a high-level language such as BPMN. In this paper, we present a service, called Security Validation as a Service (SVaaS) for validating the compliance of the business processes during design-time. Basically, while modeling a business process the business analyst specifies as well the security and compliance requirements the business process should comply to. By pressing a button, these requirements are validated and the results are presented in a graphical format to the business analysis. At the core of SVaaS lies a rigorous and industrially viable approach in which the security validation business logic is handled server-side (SVaaS Server) in the Cloud, while the client-side user interface that business analysts use is handled by a light-weight SVaaS Connector. As proof-of-concept we created a SVaaS prototype in which the SVaaS Server is deployed on the SAP NetWeaver Cloud and two SVaaS Connectors are built to enable two well-known BPMN tools, SAP NetWeaver BPM and Activiti, to consume SVaaS against industrial relevant business processes.
引用
收藏
页码:455 / 462
页数:8
相关论文
共 13 条
[1]  
Armando A., 2009, J APPL NONCLASSICAL, V19, P403
[2]  
Arsac W, 2011, SACMAT, P143
[3]  
Arsac W., 2011, LECT NOTES COMPUTER
[4]  
AVANTSSAR, 2010, DEL 2 3 ASLAN FIN VE
[5]  
Brucker A.D., 2012, Proceedings of the 17th ACM symposium on access control models and technologies (SACMAT '12), P123, DOI [10.1145/2295136.2295160, DOI 10.1145/2295136.2295160]
[6]  
Brucker A. D., 2012, LECT NOTES BUSINESS, V132
[7]   Semantics and analysis of business process models in BPMN [J].
Dijkman, Remco M. ;
Dumas, Marlon ;
Ouyang, Chun .
INFORMATION AND SOFTWARE TECHNOLOGY, 2008, 50 (12) :1281-1294
[8]  
Mulle J, 2011, TECH REP
[9]  
OMG, 2014, business process model and notation (BPMN), Version 2.0.2
[10]   A BPMN extension for the modeling of security requirements in business processes [J].
Rodriguez, Alfonso ;
Fernandez-Medina, Eduardo ;
Piattini, Mario .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2007, E90D (04) :745-752