计算机科学 ›› 2014, Vol. 41 ›› Issue (7): 81-85.doi: 10.11896/j.issn.1002-137X.2014.07.016

• 2013'Petri 网 • 上一篇    下一篇

基于CPN的BPEL活动协同授权一致性检测机制研究

上超望,刘清堂,赵刚,童名文   

  1. 华中师范大学教育信息技术学院 武汉430079;青少年网络心理与行为教育部重点实验室 武汉430079;华中师范大学教育信息技术学院 武汉430079;华中师范大学教育信息技术学院 武汉430079;华中师范大学教育信息技术学院 武汉430079
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受华中师范大学中央高校基本科研业务费项目(CCNU13A05053),教育部人文社科项目(11YJA880163),湖北省教育规划课题(2011B039),武汉市科技计划项目(2014060101010030),国家“十二五”科技支撑计划课题(2012BAD35B02)资助

Study on Mechanism of Consistency Detection in BPEL Activities Authorization Coordination Based on CPN

SHANG Chao-wang,LIU Qing-tang,ZHAO Gang and TONG Ming-wen   

  • Online:2018-11-14 Published:2018-11-14

摘要: BPEL访问控制机制是Web服务安全组合研究的重要内容,如何维护活动协同授权的一致性是其中的难点。通过扩展的CPN(有色Petri网)对BPEL活动协同授权执行的动态行为语义进行建模,利用可覆盖树方法分析协同授权模型状态变迁发生的序列,实现活动协同授权约束一致性的动态检测,为组合Web服务中业务流程协同授权约束设计的一致性提供合理的理论基础。最后,通过实例说明了检测机制的有效性。

关键词: BPEL,组合Web服务,活动,协同授权,CPN,一致性检测 中图法分类号TP393文献标识码A

Abstract: Mechanism of BPEL access control is one of focal points in Web services secure composition.It is a difficult problem to maintain the activities authorization constraint coordination.With the extended CPN(Colored Petri Nets) for modeling the dynamic behavioral semantics of BPEL activities execution,this paper used the method of coverability tree to analyze the fire sequence of model state transition,and implemented the dynamic consistency detection of activities authorization coordination.The paper provided theoretical foundation for the detection and optimization in the design of BPEL activities authorization coordination.At last,an example proved the efficiency of the mechanism.

Key words: BPEL,Composite Web services,Activity,Authorization coordination,CPN,Consistency detection

[1] 宋巍,唐金辉,张功萱,等.WS-BPEL服务可替换性分析[J].中国科学:信息科学,2012,2(3):264-279
[2] 唐佳俊,黄志球,王进.一种Web服务组合的可信评估方法[J].计算机科学,2013,0(2):163-168
[3] Manuel M,Nicola D.Implementing workflow reconfiguration in WS-BPEL[J].Journal of Internet Services and Information Security,2012,2(2):73-92
[4] Bertino E,Martino D L,et al.Security for Web services and servi- ce-oriented architectures[M].Berlin:Springer,2010:170-175
[5] Ahmed A.A compliance management framework for BusinessProcess models[D].Potsdam:University of Potsdam,2010
[6] Rafael A.An approach to data-driven detective internal controls for process-aware information Systems[C]∥Workshop on Data Usage Management on the Web 2012.2012:20-25
[7] Mohsen R.Security analysis for web services compositions[J].Journal of Scientific & Engineering Research,2012,3(5):1-8
[8] Alberto C,Silvio R,et al.Automated validation of security-sensitive Web Services specified in BPEL and RBAC[C]∥Proc of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.2010:456-464
[9] Barry D.Policy Driven Development:SOA Evolvability through Late Binding[D].San Diego:University of California,2013
[10] Karima M.On Transforming Business Patterns to Labeled Petri Nets Using Graph Grammars[J].Information Technology and Computer Science,2013,0(2):15-27
[11] 吴哲辉.Petri网导论[M].北京:机械工业出版社,2006:48-49
[12] Agnarsson G,Greenlaw R.Graph Theory:Modeling,Applications,and Algorithms[M].New York:Prentice Hall Press,2007:89-97

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!