Jump to Navigation


Adapting workflows using generic schemas: application to the security of business processes

Existing approaches to the adaptation of workflows over Web services fall short in two respects. First, they only provide, if ever, limited means for taking into account the execution history of a workflow. Second, they do not support adaptations that require modifications not only at the service composition level but also at the levels of interceptors and service implementations. This is particular problematic for the enforcement of security properties over workflows: enforcing authorization properties, for instance, frequently requires execution contexts to be defined and modifications to be applied at all these abstraction levels of Web services. We present two main contributions in this context. First, we introduce workflow adaptation schemas (WAS), a new notion of generic protocol-based workflow adapters. WAS enable the declarative definition of adaptations involving complex service compositions and implementations. Second, we present two real-world security issues related to the use of OAuth 2.0, a recent and widely used framework for the authorization of resource accesses. As we motivate, these security issues require history-based adaptations over different abstraction levels of services. We then show how to resolve these issues using WAS.

Ronan-Alexandre Cherrueau, Mario Sudholt and Omar Chebaro
Publication Date: 
Monday, December 2, 2013 to Thursday, December 5, 2013
Bristol, UK
Publication Reference: 

Cherrueau R.A., Sudholt M.,  and Chebaro O., "Adapting workflows using generic schemas: application to the security of business processes", Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Volume 1, Page(s): 519 - 524, INSPEC Accession Number: 14146173, IEEE, DOI: 10.1109/CloudCom.2013.75.