Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

An Aspect-Oriented Approach to Enforce Security Properties in Business Processes

Identifieur interne : 001645 ( Main/Exploration ); précédent : 001644; suivant : 001646

An Aspect-Oriented Approach to Enforce Security Properties in Business Processes

Auteurs : Inaya Yahya [Tunisie] ; Sameh Hbaieb Turki [Tunisie, France] ; Anis Charfi [Allemagne] ; Slim Kallel [Tunisie] ; Rafik Bouaziz [Tunisie]

Source :

RBID : ISTEX:9E0FC65CE90D6DE3FBFD7244379DAF89DADBE68E

Abstract

Abstract: Security is an essential requirement for business processes. However, we observe that security is mostly addressed at the technical implementation level and not at the design level. In a previous work we motivated the need to address security already in business process modeling. In this paper, we show how one could use Aspect-Oriented Programming (AOP) to enforce security requirements in a modular way. Starting from a business process model where security requirements are expressed using a profile mechanism we generate AspectJ [1] code, which enforces those requirements. This generation is based on a set of Model-to-Text transformation rules. As security is a typical example for crosscutting concerns the usage of aspects allows for a modular implementation, in which the implementation of the business process is separated from the implementation of the security properties.

Url:
DOI: 10.1007/978-3-642-37804-1_35


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">An Aspect-Oriented Approach to Enforce Security Properties in Business Processes</title>
<author>
<name sortKey="Yahya, Inaya" sort="Yahya, Inaya" uniqKey="Yahya I" first="Inaya" last="Yahya">Inaya Yahya</name>
</author>
<author>
<name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
</author>
<author>
<name sortKey="Charfi, Anis" sort="Charfi, Anis" uniqKey="Charfi A" first="Anis" last="Charfi">Anis Charfi</name>
</author>
<author>
<name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
</author>
<author>
<name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:9E0FC65CE90D6DE3FBFD7244379DAF89DADBE68E</idno>
<date when="2013" year="2013">2013</date>
<idno type="doi">10.1007/978-3-642-37804-1_35</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-PN6MKPVN-K/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002506</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002506</idno>
<idno type="wicri:Area/Istex/Curation">002475</idno>
<idno type="wicri:Area/Istex/Checkpoint">000271</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000271</idno>
<idno type="wicri:doubleKey">0302-9743:2013:Yahya I:an:aspect:oriented</idno>
<idno type="wicri:Area/Main/Merge">001657</idno>
<idno type="wicri:Area/Main/Curation">001645</idno>
<idno type="wicri:Area/Main/Exploration">001645</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">An Aspect-Oriented Approach to Enforce Security Properties in Business Processes</title>
<author>
<name sortKey="Yahya, Inaya" sort="Yahya, Inaya" uniqKey="Yahya I" first="Inaya" last="Yahya">Inaya Yahya</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Tunisie</country>
<wicri:regionArea>MIRACL, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation></affiliation>
</author>
<author>
<name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Tunisie</country>
<wicri:regionArea>MIRACL, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">France</country>
</affiliation>
</author>
<author>
<name sortKey="Charfi, Anis" sort="Charfi, Anis" uniqKey="Charfi A" first="Anis" last="Charfi">Anis Charfi</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>SAP Research, Darmstadt</wicri:regionArea>
<placeName>
<region type="land" nuts="1">Hesse (Land)</region>
<region type="district" nuts="2">District de Darmstadt</region>
<settlement type="city">Darmstadt</settlement>
</placeName>
</affiliation>
<affiliation></affiliation>
</author>
<author>
<name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Tunisie</country>
<wicri:regionArea>ReDCAD, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Tunisie</country>
</affiliation>
</author>
<author>
<name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Tunisie</country>
<wicri:regionArea>MIRACL, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Tunisie</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Security is an essential requirement for business processes. However, we observe that security is mostly addressed at the technical implementation level and not at the design level. In a previous work we motivated the need to address security already in business process modeling. In this paper, we show how one could use Aspect-Oriented Programming (AOP) to enforce security requirements in a modular way. Starting from a business process model where security requirements are expressed using a profile mechanism we generate AspectJ [1] code, which enforces those requirements. This generation is based on a set of Model-to-Text transformation rules. As security is a typical example for crosscutting concerns the usage of aspects allows for a modular implementation, in which the implementation of the business process is separated from the implementation of the security properties.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Allemagne</li>
<li>France</li>
<li>Tunisie</li>
</country>
<region>
<li>District de Darmstadt</li>
<li>Hesse (Land)</li>
</region>
<settlement>
<li>Darmstadt</li>
</settlement>
</list>
<tree>
<country name="Tunisie">
<noRegion>
<name sortKey="Yahya, Inaya" sort="Yahya, Inaya" uniqKey="Yahya I" first="Inaya" last="Yahya">Inaya Yahya</name>
</noRegion>
<name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
<name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
<name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
<name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
<name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
</country>
<country name="France">
<noRegion>
<name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
</noRegion>
</country>
<country name="Allemagne">
<region name="Hesse (Land)">
<name sortKey="Charfi, Anis" sort="Charfi, Anis" uniqKey="Charfi A" first="Anis" last="Charfi">Anis Charfi</name>
</region>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001645 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001645 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:9E0FC65CE90D6DE3FBFD7244379DAF89DADBE68E
   |texte=   An Aspect-Oriented Approach to Enforce Security Properties in Business Processes
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022