An Aspect-Oriented Approach to Enforce Security Properties in Business Processes
Identifieur interne : 001645 ( Main/Exploration ); précédent : 001644; suivant : 001646An Aspect-Oriented Approach to Enforce Security Properties in Business Processes
Auteurs : Inaya Yahya [Tunisie] ; Sameh Hbaieb Turki [Tunisie, France] ; Anis Charfi [Allemagne] ; Slim Kallel [Tunisie] ; Rafik Bouaziz [Tunisie]Source :
- Lecture Notes in Computer Science [ 0302-9743 ]
Abstract
Abstract: Security is an essential requirement for business processes. However, we observe that security is mostly addressed at the technical implementation level and not at the design level. In a previous work we motivated the need to address security already in business process modeling. In this paper, we show how one could use Aspect-Oriented Programming (AOP) to enforce security requirements in a modular way. Starting from a business process model where security requirements are expressed using a profile mechanism we generate AspectJ [1] code, which enforces those requirements. This generation is based on a set of Model-to-Text transformation rules. As security is a typical example for crosscutting concerns the usage of aspects allows for a modular implementation, in which the implementation of the business process is separated from the implementation of the security properties.
Url:
DOI: 10.1007/978-3-642-37804-1_35
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 002506
- to stream Istex, to step Curation: 002475
- to stream Istex, to step Checkpoint: 000271
- to stream Main, to step Merge: 001657
- to stream Main, to step Curation: 001645
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">An Aspect-Oriented Approach to Enforce Security Properties in Business Processes</title>
<author><name sortKey="Yahya, Inaya" sort="Yahya, Inaya" uniqKey="Yahya I" first="Inaya" last="Yahya">Inaya Yahya</name>
</author>
<author><name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
</author>
<author><name sortKey="Charfi, Anis" sort="Charfi, Anis" uniqKey="Charfi A" first="Anis" last="Charfi">Anis Charfi</name>
</author>
<author><name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
</author>
<author><name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:9E0FC65CE90D6DE3FBFD7244379DAF89DADBE68E</idno>
<date when="2013" year="2013">2013</date>
<idno type="doi">10.1007/978-3-642-37804-1_35</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-PN6MKPVN-K/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002506</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002506</idno>
<idno type="wicri:Area/Istex/Curation">002475</idno>
<idno type="wicri:Area/Istex/Checkpoint">000271</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000271</idno>
<idno type="wicri:doubleKey">0302-9743:2013:Yahya I:an:aspect:oriented</idno>
<idno type="wicri:Area/Main/Merge">001657</idno>
<idno type="wicri:Area/Main/Curation">001645</idno>
<idno type="wicri:Area/Main/Exploration">001645</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">An Aspect-Oriented Approach to Enforce Security Properties in Business Processes</title>
<author><name sortKey="Yahya, Inaya" sort="Yahya, Inaya" uniqKey="Yahya I" first="Inaya" last="Yahya">Inaya Yahya</name>
<affiliation wicri:level="1"><country xml:lang="fr">Tunisie</country>
<wicri:regionArea>MIRACL, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation></affiliation>
</author>
<author><name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
<affiliation wicri:level="1"><country xml:lang="fr">Tunisie</country>
<wicri:regionArea>MIRACL, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">France</country>
</affiliation>
</author>
<author><name sortKey="Charfi, Anis" sort="Charfi, Anis" uniqKey="Charfi A" first="Anis" last="Charfi">Anis Charfi</name>
<affiliation wicri:level="3"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>SAP Research, Darmstadt</wicri:regionArea>
<placeName><region type="land" nuts="1">Hesse (Land)</region>
<region type="district" nuts="2">District de Darmstadt</region>
<settlement type="city">Darmstadt</settlement>
</placeName>
</affiliation>
<affiliation></affiliation>
</author>
<author><name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
<affiliation wicri:level="1"><country xml:lang="fr">Tunisie</country>
<wicri:regionArea>ReDCAD, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Tunisie</country>
</affiliation>
</author>
<author><name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
<affiliation wicri:level="1"><country xml:lang="fr">Tunisie</country>
<wicri:regionArea>MIRACL, University of Sfax</wicri:regionArea>
<wicri:noRegion>University of Sfax</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Tunisie</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: Security is an essential requirement for business processes. However, we observe that security is mostly addressed at the technical implementation level and not at the design level. In a previous work we motivated the need to address security already in business process modeling. In this paper, we show how one could use Aspect-Oriented Programming (AOP) to enforce security requirements in a modular way. Starting from a business process model where security requirements are expressed using a profile mechanism we generate AspectJ [1] code, which enforces those requirements. This generation is based on a set of Model-to-Text transformation rules. As security is a typical example for crosscutting concerns the usage of aspects allows for a modular implementation, in which the implementation of the business process is separated from the implementation of the security properties.</div>
</front>
</TEI>
<affiliations><list><country><li>Allemagne</li>
<li>France</li>
<li>Tunisie</li>
</country>
<region><li>District de Darmstadt</li>
<li>Hesse (Land)</li>
</region>
<settlement><li>Darmstadt</li>
</settlement>
</list>
<tree><country name="Tunisie"><noRegion><name sortKey="Yahya, Inaya" sort="Yahya, Inaya" uniqKey="Yahya I" first="Inaya" last="Yahya">Inaya Yahya</name>
</noRegion>
<name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
<name sortKey="Bouaziz, Rafik" sort="Bouaziz, Rafik" uniqKey="Bouaziz R" first="Rafik" last="Bouaziz">Rafik Bouaziz</name>
<name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
<name sortKey="Kallel, Slim" sort="Kallel, Slim" uniqKey="Kallel S" first="Slim" last="Kallel">Slim Kallel</name>
<name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
</country>
<country name="France"><noRegion><name sortKey="Turki, Sameh Hbaieb" sort="Turki, Sameh Hbaieb" uniqKey="Turki S" first="Sameh Hbaieb" last="Turki">Sameh Hbaieb Turki</name>
</noRegion>
</country>
<country name="Allemagne"><region name="Hesse (Land)"><name sortKey="Charfi, Anis" sort="Charfi, Anis" uniqKey="Charfi A" first="Anis" last="Charfi">Anis Charfi</name>
</region>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001645 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001645 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:9E0FC65CE90D6DE3FBFD7244379DAF89DADBE68E |texte= An Aspect-Oriented Approach to Enforce Security Properties in Business Processes }}
This area was generated with Dilib version V0.6.33. |