Obtaining secure BPEL from Secure Business Process specified with BPMN

被引:1
|
作者
Marquez, G. [1 ]
Rodriguez, A. [1 ]
Medina, E. F. [2 ]
机构
[1] Univ Bio Bio, Chillan, Chile
[2] Univ Castilla La Mancha, E-13071 Ciudad Real, Spain
关键词
Business Process; Secure Business Process; BPEL; REQUIREMENTS;
D O I
10.1109/TLA.2014.6749554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business Processes are an important resource for performance on business competitiveness. The Business Process descriptions made; with BPMN (Business Process Modelling Notation), the de facto standard in the market, can be translated into execution languages; such as BPEL (Business Process Execution Language). Originally, BPMN specification does not include the representation of security aspects. However, there are proposals that incorporate security specifications of Business Processes using BPMN. Among these we have considered for describing a SBP (Secure Business Process), incorporating the business analyst's perspective in relation to security. However, until now, there are no translations of the SBP to execution languages. In this paper we propose a translation of the security requirements, including access control, defined in a SBP to secure Web services using BPEL language.
引用
收藏
页码:315 / 320
页数:6
相关论文
共 50 条
  • [1] Secure Data Transmission in BPEL (Business Process Execution Language)
    Verma, Satya Bhushan
    Verma, Shashi Bhushan
    [J]. ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2020, 9 (03): : 105 - 117
  • [2] Obtaining secure business process models from an enterprise architecture considering security requirements
    San Martin, Luis
    Rodriguez, Alfonso
    Caro, Angelica
    Velasquez, Ignacio
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2022, 28 (01) : 150 - 177
  • [3] From BPMN process models to BPEL Web Services
    Ouyang, Chun
    Dumas, Marlon
    ter Hofstede, Arthur H. M.
    van der Aalst, Wil M. P.
    [J]. ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2006, : 285 - +
  • [4] Secure business process management: A roadmap
    Neubauer, Thomas
    Klemen, Markus
    Biffl, Stefan
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 457 - +
  • [5] Designing Secure Service Workflows in BPEL
    Pino, Luca
    Mahbub, Khaled
    Spanoudakis, George
    [J]. SERVICE-ORIENTED COMPUTING, ICSOC 2014, 2014, 8831 : 551 - 559
  • [6] Towards CIM to PIM transformation:: From secure business processes defined in BPMN to use-cases
    Rodriguez, Alfonso
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2007, 4714 : 408 - +
  • [7] A Method of Transition from BPMN to BPEL
    Lu, Mingxiang
    Cai, Qiang
    Li, Haisheng
    [J]. PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, IET AIAI2011, 2011, : 372 - 375
  • [8] Towards the Derivation of Secure Business Process Designs
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 248 - 258
  • [9] A Secure Business Process Modelling For Better Alignment between Business and IT
    Alotaibi, Youseef
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 4793 - 4802
  • [10] Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns
    Zapata-Barra, Matias
    Rodriguez, Alfonso
    Caro, Angelica
    Fernandez, Eduardo B.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 24 (10) : 1472 - 1492