Abstract
Controlling access to Web services of public agencies as well as private corporations primarily depends on specification and deployment of functional security rules in order to satisfy strict regulations imposed by governments, particularly in financial and health sectors. This paper focuses on one aspect of the SELKIS and EB3SEC projects related to security of Web-based information systems, namely the automatic transformation of security rules, instantiated from security rule patterns written in a graphical notation with a denotational semantics close to statecharts, into WS-BPEL (or BPEL for short) processes. The latter are executed by a BPEL engine integrated into a policy decision point, a component of a policy enforcement manager similar to the one proposed in the XACML standard.
The research described in this paper was supported in part by the Natural Sciences and Engineering Research Council of Canada (NSERC) and the French National Research Agency (ANR).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Basin, D.A., Burri, S.J., Karjoth, G.: Dynamic enforcement of abstract separation of duty constraints. In: 14th European Symposium on Research in Computer Security, pp. 250–267 (2009)
Konopacki, P., Frappier, M., Laleau, R.: Expressing access control policies with an event-based approach. Technical Report TR-LACL-2010-6, LACL (Laboratory of Algorithms, Complexity and Logic), University of Paris-Est (2010)
Konopacki, P., Frappier, M., Laleau, R.: Modélisation de politiques de sécurité à l’aide d’une algèbre de processus. RSTI - Ingénierie des systèmes d’information 15(3), 113–136 (2010)
Yao, W., Moody, K., Bacon, J.: A model of OASIS role-based access control and its support for active security. In: 6th ACM Symposium on Access Control Models and Technologies, pp. 171–181 (2001)
Harel, D.: Statecharts: A visual formalism for complex systems. Science of Computer Programming 8(3), 231–274 (1987)
Milhau, J., Frappier, M., Gervais, F., Laleau, R.: Systematic translation rules from astd to event-B. In: Méry, D., Merz, S. (eds.) IFM 2010. LNCS, vol. 6396, pp. 245–259. Springer, Heidelberg (2010)
Abrial, J.R.: Modeling in Event-B. Cambridge University Press, Cambridge (2010)
Frappier, M., Gervais, F., Laleau, R., Fraikin, B.: Algebraic state transition diagrams. Technical Report 24, Département d’informatique, Université de Sherbrooke (2008)
OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS (2005)
Embe Jiague, M., Frappier, M., Gervais, F., Konopacki, P., Milhau, J., Laleau, R., St-Denis, R.: Model-driven engineering of functional security policies. In: International Conference on Enterprise Information Systems, vol. 3, pp. 374–379 (2010)
Frappier, M., Gervais, F., Laleau, R., Fraikin, B., St-Denis, R.: Extending statecharts with process algebra operators. Innovations in Systems and Software Engineering 4(3), 285–292 (2008)
OASIS: Web Services Business Process Execution Language Version 2.0. OASIS (2007)
Aït-Sadoune, I., Aït-Ameur, Y.: Stepwise design of BPEL Web services compositions, an Event B refinement based approach. In: 8th ACIS International Conference on Software Engineering Research, Management and Applications, pp. 51–68 (2010)
Abrial, J.R., Butler, M., Hallerstede, S., Hoang, T.S., Mehta, F., Voisin, L.: Rodin: an open toolset for modelling and reasoning in Event-B. Software Tools for Technology Transfer 12(6), 447–466 (2010)
INCITS: Role Base Access Control. ANSI (2004)
Sohr, K., Mustafa, T., Bao, X., Ahn, G.J.: Enforcing role-based access control policies in Web services with UML and OCL. In: 24th Annual Computer Security Applications Conference, pp. 257–266 (2008)
Kolundžija, M.: Security types for sessions and pipelines. In: Bruni, R., Wolf, K. (eds.) WS-FM 2008. LNCS, vol. 5387, pp. 175–190. Springer, Heidelberg (2009)
Boreale, M., Bruni, R., Nicola, R., Loreti, M.: Sessions and pipelines for structured service programming. In: 10th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, pp. 19–38 (2008)
Hassan, W., Slimani, N., Adi, K., Logrippo, L.: Secrecy UML method for model transformations. In: 2nd International Conference ABZ Short Papers, pp. 16–21 (2010)
Li, N., Wang, Q.: Beyond separation of duty: an algebra for specifying high-level security policies. In: 13th ACM Conference on Computer and Communications Security, pp. 356–369 (2006)
Hoare, C.A.R.: Communicating sequential processes. Communications of the ACM 21(8), 666–677 (1978)
Paci, F., Bertino, E., Crampton, J.: An access-control framework for WS-BPEL. International Journal of Web Services Research 5(3), 20–43 (2008)
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2), 214–260 (2001)
Wong, P.Y.H., Gibbons, J.: A process-algebraic approach to workflow specification and refinement. In: Software Composition, pp. 51–65 (2007)
van der Aalst, W.M.P.: The application of Petri nets to workflow management. The Journal of Circuits, Systems and Computers 8(1), 21–66 (1998)
Massuthe, P., Reisig, W., Schmidt, K.: An operating guideline approach to the SOA. Annals of Mathematics, Computing & Teleinformatics 1, 35–43 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiague, M.E., Frappier, M., Gervais, F., Laleau, R., St-Denis, R. (2011). From ASTD Access Control Policies to WS-BPEL Processes Deployed in a SOA Environment. In: Chiu, D.K.W., et al. Web Information Systems Engineering – WISE 2010 Workshops. WISE 2010. Lecture Notes in Computer Science, vol 6724. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24396-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-24396-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24395-0
Online ISBN: 978-3-642-24396-7
eBook Packages: Computer ScienceComputer Science (R0)