Computer Science ›› 2014, Vol. 41 ›› Issue (7): 81-85.doi: 10.11896/j.issn.1002-137X.2014.07.016

Previous Articles     Next Articles

Study on Mechanism of Consistency Detection in BPEL Activities Authorization Coordination Based on CPN

SHANG Chao-wang,LIU Qing-tang,ZHAO Gang and TONG Ming-wen   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Mechanism of BPEL access control is one of focal points in Web services secure composition.It is a difficult problem to maintain the activities authorization constraint coordination.With the extended CPN(Colored Petri Nets) for modeling the dynamic behavioral semantics of BPEL activities execution,this paper used the method of coverability tree to analyze the fire sequence of model state transition,and implemented the dynamic consistency detection of activities authorization coordination.The paper provided theoretical foundation for the detection and optimization in the design of BPEL activities authorization coordination.At last,an example proved the efficiency of the mechanism.

Key words: BPEL,Composite Web services,Activity,Authorization coordination,CPN,Consistency detection

[1] 宋巍,唐金辉,张功萱,等.WS-BPEL服务可替换性分析[J].中国科学:信息科学,2012,2(3):264-279
[2] 唐佳俊,黄志球,王进.一种Web服务组合的可信评估方法[J].计算机科学,2013,0(2):163-168
[3] Manuel M,Nicola D.Implementing workflow reconfiguration in WS-BPEL[J].Journal of Internet Services and Information Security,2012,2(2):73-92
[4] Bertino E,Martino D L,et al.Security for Web services and servi- ce-oriented architectures[M].Berlin:Springer,2010:170-175
[5] Ahmed A.A compliance management framework for BusinessProcess models[D].Potsdam:University of Potsdam,2010
[6] Rafael A.An approach to data-driven detective internal controls for process-aware information Systems[C]∥Workshop on Data Usage Management on the Web 2012.2012:20-25
[7] Mohsen R.Security analysis for web services compositions[J].Journal of Scientific & Engineering Research,2012,3(5):1-8
[8] Alberto C,Silvio R,et al.Automated validation of security-sensitive Web Services specified in BPEL and RBAC[C]∥Proc of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.2010:456-464
[9] Barry D.Policy Driven Development:SOA Evolvability through Late Binding[D].San Diego:University of California,2013
[10] Karima M.On Transforming Business Patterns to Labeled Petri Nets Using Graph Grammars[J].Information Technology and Computer Science,2013,0(2):15-27
[11] 吴哲辉.Petri网导论[M].北京:机械工业出版社,2006:48-49
[12] Agnarsson G,Greenlaw R.Graph Theory:Modeling,Applications,and Algorithms[M].New York:Prentice Hall Press,2007:89-97

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!