This graphical modeling language is used to express the data and control flow of business processes. Its main characteristic is the intermittent use of event symbols with function symbols. Whenever an event occurs, its subsequent functions are invoked.
Published in Chapter:
Automatic Transformation of Generic, Validated Business Process Security Models to WS-SecurityPolicy Descriptions
Sven Feja (Christian-Albrechts-University of Kiel, Germany), Sven August (Christian-Albrechts-University of Kiel, Germany), Andreas Speck (Christian-Albrechts-University of Kiel, Germany), Meiko Jensen (Ruhr-University Bochum, Germany), and Jörg Schwenk (Ruhr-University Bochum, Germany)
Copyright: © 2012
|Pages: 28
DOI: 10.4018/978-1-4666-0146-8.ch014
Abstract
In this chapter, the authors discuss the general capabilities and constraints for model-driven security. Furthermore, the authors focus on the automatic transformation of security models into executable security implementations as well as on the validation of the security models to ensure their correctness. Based on the discussion, the authors present a transformation mechanism that automatically derives WS-SecurityPolicy-conformant security policies. Moreover, the chapter presents a validation mechanism for the security model which is based on graphical validation rules. The application of both mechanisms allows the automatic deployment of validated, security-enabled Web Service based business processes.