计算机科学 ›› 2014, Vol. 41 ›› Issue (7): 81-85.doi: 10.11896/j.issn.1002-137X.2014.07.016
上超望,刘清堂,赵刚,童名文
SHANG Chao-wang,LIU Qing-tang,ZHAO Gang and TONG Ming-wen
摘要: BPEL访问控制机制是Web服务安全组合研究的重要内容,如何维护活动协同授权的一致性是其中的难点。通过扩展的CPN(有色Petri网)对BPEL活动协同授权执行的动态行为语义进行建模,利用可覆盖树方法分析协同授权模型状态变迁发生的序列,实现活动协同授权约束一致性的动态检测,为组合Web服务中业务流程协同授权约束设计的一致性提供合理的理论基础。最后,通过实例说明了检测机制的有效性。
[1] 宋巍,唐金辉,张功萱,等.WS-BPEL服务可替换性分析[J].中国科学:信息科学,2012,2(3):264-279 [2] 唐佳俊,黄志球,王进.一种Web服务组合的可信评估方法[J].计算机科学,2013,0(2):163-168 [3] Manuel M,Nicola D.Implementing workflow reconfiguration in WS-BPEL[J].Journal of Internet Services and Information Security,2012,2(2):73-92 [4] Bertino E,Martino D L,et al.Security for Web services and servi- ce-oriented architectures[M].Berlin:Springer,2010:170-175 [5] Ahmed A.A compliance management framework for BusinessProcess models[D].Potsdam:University of Potsdam,2010 [6] Rafael A.An approach to data-driven detective internal controls for process-aware information Systems[C]∥Workshop on Data Usage Management on the Web 2012.2012:20-25 [7] Mohsen R.Security analysis for web services compositions[J].Journal of Scientific & Engineering Research,2012,3(5):1-8 [8] Alberto C,Silvio R,et al.Automated validation of security-sensitive Web Services specified in BPEL and RBAC[C]∥Proc of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.2010:456-464 [9] Barry D.Policy Driven Development:SOA Evolvability through Late Binding[D].San Diego:University of California,2013 [10] Karima M.On Transforming Business Patterns to Labeled Petri Nets Using Graph Grammars[J].Information Technology and Computer Science,2013,0(2):15-27 [11] 吴哲辉.Petri网导论[M].北京:机械工业出版社,2006:48-49 [12] Agnarsson G,Greenlaw R.Graph Theory:Modeling,Applications,and Algorithms[M].New York:Prentice Hall Press,2007:89-97 |
No related articles found! |
|