Model-driven business process security requirement specification

被引:61
作者
Wolter, Christian [1 ]
Menzel, Michael [2 ]
Schaad, Andreas [1 ]
Miseldine, Philip [1 ]
Meinel, Christoph [2 ]
机构
[1] SAP Res, CEC Karlsruhe, D-76131 Karlsruhe, Germany
[2] Hasso Plattner Inst, D-14482 Potsdam, Germany
关键词
Web service security; Business process; Model transformation; Security annotations; Access control;
D O I
10.1016/j.sysarc.2008.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Various types of security goals, such as authentication or confidentiality. can be defined as policies for service-oriented architectures, typically in a manual fashion. Therefore, we foster a model-driven transformation approach from modelled security goals in the context of process models to concrete security implementations. We argue that specific types of security goals may be expressed in a graphical fashion at the business process modelling level which in turn can be transformed into corresponding access control and security policies. In this paper we present security policy and policy constraint models. We further discuss a translation of security annotated business processes into platform specific target languages, such as XACML or AXIS2 security configurations. To demonstrate the suitability of this approach an example transformation is presented based on an annotated process. (C) 2008 Elsevier B.V. All rights reserved
引用
收藏
页码:211 / 223
页数:13
相关论文
共 34 条
  • [1] ABEYRUWAN S, 2008, APACHE RAMPART WS SE
  • [2] ALBERTS C, 2003, NETWORKED SYSTEMS SU
  • [3] Anderson A., 2005, CORE HIERARCHICAL RO
  • [4] Basin D., 2003, Proceedings 8th ACM Symposium on Access Control Models and Technologies (SACMAT '03), P100, DOI DOI 10.1145/775412.775425
  • [5] BEISIEGEL M, 2007, 7SCA POLICY IN PRESS
  • [6] Ben-Ari M., PRINCIPLES SPIN MODE
  • [7] CLARKE EM, 2000, ORNA GRUMBERG DOR A
  • [8] Denker G, 2003, LECT NOTES COMPUT SC, V2870, P335
  • [9] DENKER G, 2003, INT SEM WEB C, P335
  • [10] Goldblatt R., 1987, Logics of Time and Computation