The Community for Technology Leaders
2013 IEEE 5th International Conference on Cloud Computing Technology and Science (2013)
Bristol, United Kingdom United Kingdom
Dec. 2, 2013 to Dec. 5, 2013
pp: 519-524
ABSTRACT
Existing approaches to the adaptation of workflows over web services fall short in two respects. First, they only provide, if ever, limited means for taking into account the execution history of a workflow. Second, they do not support adaptations that require modifications not only at the service composition level but also at the levels of interceptors and service implementations. This is particular problematic for the enforcement of security properties over workflows: enforcing authorization properties, for instance, frequently requires execution contexts to be defined and modifications to be applied at all these abstraction levels of web services. We present two main contributions in this context. First, we introduce workflow adaptation schemas (WAS), a new notion of generic protocol-based workflow adapters. WAS enable the declarative definition of adaptations involving complex service compositions and implementations. Second, we present two real-world security issues related to the use of OAuth 2.0, a recent and widely used framework for the authorization of resource accesses. As we motivate, these security issues require history-based adaptations over different abstraction levels of services. We then show how to resolve these issues using WAS.
INDEX TERMS
Authorization, Protocols, Pattern matching, Cloud computing, Context
CITATION
Ronan-Alexandre Cherrueau, Mario Sudholt, Omar Chebaro, "Adapting Workflows Using Generic Schemas: Application to the Security of Business Processes", 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, vol. 01, no. , pp. 519-524, 2013, doi:10.1109/CloudCom.2013.75
98 ms
(Ver 3.3 (11022016))