Abstract
Security is an essential requirement for business processes. However, we observe that security is mostly addressed at the technical implementation level and not at the design level. In a previous work we motivated the need to address security already in business process modeling. In this paper, we show how one could use Aspect-Oriented Programming (AOP) to enforce security requirements in a modular way. Starting from a business process model where security requirements are expressed using a profile mechanism we generate AspectJ [1] code, which enforces those requirements. This generation is based on a set of Model-to-Text transformation rules. As security is a typical example for crosscutting concerns the usage of aspects allows for a modular implementation, in which the implementation of the business process is separated from the implementation of the security properties.
Chapter PDF
Similar content being viewed by others
References
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Lindskov Knudsen, J. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327–353. Springer, Heidelberg (2001)
Charfi, A., Turki, S.H., Chaâbane, A., Bouaziz, R.: A model-driven approach to developing web service compositions based on BPMN4SOA. J. Reasoning-Based Intelligent Systems 3(3/4) (2011)
Object Management Group: Business Process Modeling Notation (BPMN) 2.0, http://www.omg.org/spec/BPMN/2.0
Turki, S.H., Bellaaj, F., Charfi, A., Bouaziz, R.: Modeling Security Requirements in Service Based Business Processes. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) BPMDS 2012 and EMMSAD 2012. LNBIP, vol. 113, pp. 76–90. Springer, Heidelberg (2012)
Eclipse Xpand Project, http://www.eclipse.org/modeling/m2t/?project=xpand
Chaâbane, A., Turki, S.H., Charfi, A., Bouaziz, R.: From Platform Independent Service Composition Models in BPMN4SOA to Executable Service Compositions. In: Proc. of iiWAS, France, pp. 653–656 (2010)
OMG.: UML: Superstructure version 2.0 (2005), http://www.omg.org/spec/UML/2.0/
Nakamura, Y., Tatsubori, M., Imamura, T., Ono, K.: Model-driven security based on Web services security architecture. In: Proc. of SCC, Florida, USA, pp. 7–15 (2005)
Gallino, J.P.S., Miguel, M., Briones, J.F., Alejandro, A.: Domain-Specific Multi-Modeling of Security Concerns in Service-Oriented Architectures. In: Proc. of SCC, Washington, USA, pp. 761–762 (2011)
Menzel, M., Warschofsky, R., Meinel, C.: A Pattern-driven Generation of Security Policies for Service-oriented Architectures. In: Proc. of ICWS, Florida, USA, pp. 243–250 (2010)
Satoh, F., Nakamura, Y., Mukhi, K.N., Tatsubori, M., Ono, K.: Model-Driven Approach for End-to-End SOA Security Configurations. In: Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods, ch. 12, pp. 269–298 (2011)
Rodriguez, A., Piattini, E.F.-M.M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. J. IEICE - Transactions on Information and Systems E90-D(4), 745–752 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yahya, I., Turki, S.H., Charfi, A., Kallel, S., Bouaziz, R. (2013). An Aspect-Oriented Approach to Enforce Security Properties in Business Processes. In: Ghose, A., et al. Service-Oriented Computing - ICSOC 2012 Workshops. ICSOC 2012. Lecture Notes in Computer Science, vol 7759. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37804-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-37804-1_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37803-4
Online ISBN: 978-3-642-37804-1
eBook Packages: Computer ScienceComputer Science (R0)