Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security

Published: 01 January 2012 Publication History

Abstract

In this paper, we propose a new framework for the dynamic enforcement of composite Web services security, which is based on a synergy between Aspect-Oriented Programming (AOP) and BPEL (Business Process Execution Language). This synergy is achieved through the elaboration of a new language called AspectBPEL, which is used to specify security policies as separate components, referred to as aspects, to be weaved systematically in a BPEL process. The injected aspects activate the security policies at runtime on specific join points. Our approach enjoys several additional features such as (1) separating the business and security concerns of composite Web services (2) allowing the update of security mechanisms of composite Web services at run time, (3) providing modularity for modelling cross-cutting concerns between Web services, (4) centralising some security measurements at the BPEL side and (5) providing a framework fully compatible with any BPEL engine regardless of the adopted development environment.

References

[1]
Agostino Ardagna, C., Damiani, E., De Capitani di Vimercati, S. and Samarati, P. (2006) 'A web service architecture for enforcing access control policies', Electronic Notes Theoretical Computer Science, Vol. 142, p.4762.
[2]
Atkinson, B. (2006) Web services security (WS-Security). Available online at: http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=wss
[3]
Bhatti, R., Joshi, J., Bertino, E. and Ghafoor, A. (2003) 'Access control in dynamic XML-based web-services with X-RBAC', Proceedings of the International Conference on Web Services (ICWS 03).
[4]
Bodkin, R. (2004) 'Enterprise security aspects', Proceedings of the AOSD 04 Workshop on AOSD Technology for Application-level Security.
[5]
Charfi, A. and Mezini, M. (2004) 'Aspect-oriented web service composition with AO4BPEL', ECOWS 04.
[6]
DeWin, B. (2004) Engineering Application Level Security through Aspect Oriented Software Development, PhD Thesis, Katholieke Universiteit Leuven.
[7]
Di Francescomarino, C and Tonella, P. (2009) 'Cooperative aspect oriented programming for executable business processes', Proceedings of the 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems, Vancouver, Canada.
[8]
Evermann, J. (2007) 'A meta-level specification and profile for AspectJ in UML', Journal of Object Technology, Vol. 6, No. 7, pp. 27-49.
[9]
Fuentes, L. and Sanchez, P. (2006) 'Elaborating UML 2.0 Profiles for AO Design', Proceedings of the International Workshop on Aspect-Oriented Modeling.
[10]
Huang, M., Wang, C. and Zhang, L. (2004) 'Toward a reusable and generic security aspect library', Proceedings of the AOSD'04 Workshop on AOSD Technology for Application level Security.
[11]
Hummer, W., Gaubatz, P., Strembeck, M., Zdun, U. and Dustdar, S. (2011) 'An integrated approach for identity and access management in a SOA context', Proceedings of the 16th ACM symposium on Access Control Models and Technologies (SACMAT 11), New York, USA.
[12]
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J. and Griswold, W.G. (2001) 'An overview of AspectJ', Proceedings of the 15th European Conference on Object-Oriented Programming (ECOOP 01), Springer-Verlag, London, UK.
[13]
Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, Ch., Lopes, C., Loingtier, J-M. and Irwin, J. (1997) 'Aspect-oriented programming', in Aksit, M. and Matsuoka, S. (Eds): Proceedings European Conference on Object-Oriented Programming, Springer-Verlag, Berlin, Heidelberg.
[14]
Lockhart, B. (2008) OASIS Security Services TC (SAML). Available online at: http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=security
[15]
Moses, T. (2011) OASIS eXtensible Access Control Markup Languag e(XACML), OASIS Standard 2.0. Available online at: http://www.oasis-open.org/committees/xacml/
[16]
Nolan, P. (2004) Understand WS-Policy processing, Technical report, IBM Corporation.
[17]
Paci, F., Bertino, E. and Crampton, J. (2008) 'An access-control framework for WS-BPEL', International Journal of Web Services Research, Vol. 5, No. 3, pp. 20-43.
[18]
Pavlich-Mariscal, J., Michel, L. and Demurjian, S. (2007) 'Enhancing UML to model custom security aspects', Proceedings of the 11th International Workshop on Aspect-Oriented Modeling.
[19]
Schlimmer, J. (2004) Web Services Policy Framework (WS-Policy). Available online at: http://www-128. ibm.com/developerworks/Webservices/library/specification/ws-polfram/
[20]
Shah, V. (2003) An Aspect-Oriented Security Assurance Solution, Technical Report AFRL-IF-RS-TR-2003-254, Cigital Labs.
[21]
Slowikowski, P. and Zielinski, K. (2003) 'Comparison study of aspect-oriented and container managed security', Proceedings of the ECCOP Workshop on Analysis of Aspect-Oriented Software.
[22]
Sun, M., Li, B. and Zhang, P. (2009) 'Monitoring BPEL-based web service composition using AOP', Proceedings of The 8th IEEE/ACIS International Conference on Computer and Information Science, Washington, DC, USA.
[23]
Wu-Lee, C. and Hwang, G. (2010) 'Dynamic policies for supporting quality of service in service-oriented architecture', Proceedings of the International Conference on Electronics and Information Engineering, Washington, DC, USA.

Cited By

View all
  1. A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image International Journal of Web and Grid Services
    International Journal of Web and Grid Services  Volume 8, Issue 4
    January 2012
    104 pages
    ISSN:1741-1106
    EISSN:1741-1114
    Issue’s Table of Contents

    Publisher

    Inderscience Publishers

    Geneva 15, Switzerland

    Publication History

    Published: 01 January 2012

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)From model-driven specification to design-level set-based analysis of XACML policiesComputers and Electrical Engineering10.1016/j.compeleceng.2015.09.02152:C(65-79)Online publication date: 1-May-2016
    • (2015)SBA-XACMLExpert Systems with Applications: An International Journal10.1016/j.eswa.2014.07.03142:1(165-178)Online publication date: 1-Jan-2015
    • (2015)AOMD approach for context-adaptable and conflict-free Web services compositionComputers and Electrical Engineering10.1016/j.compeleceng.2015.04.00444:C(200-217)Online publication date: 1-May-2015
    • (2015)Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policiesComputers and Electrical Engineering10.1016/j.compeleceng.2014.12.01244:C(91-103)Online publication date: 1-May-2015
    • (2014)A Context-Based Security Framework for Cloud ServicesProceedings of the 3rd International Conference on Context-Aware Systems and Applications10.5555/2762722.2762748(130-137)Online publication date: 7-Oct-2014
    • (2014)SC-WSInternational Journal of Organizational and Collective Intelligence10.4018/ijoci.20140401024:2(31-44)Online publication date: 1-Apr-2014
    • (2013)New XACML-AspectBPEL approach for composite web services securityInternational Journal of Web and Grid Services10.1504/IJWGS.2013.0541099:2(127-145)Online publication date: 1-May-2013

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media