Abstract
Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on formal modelling and verification of BPEL has largely concentrated on control flow and data flow, while security related properties have received little attention. In this work, we present a formal framework that integrates Role Based Access Control (RBAC) into BPEL and allows us to express authorisation constraints using temporal logic. Using this framework, we show how model-checking can be applied to verify that a given BPEL process satisfies the security constraints.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahn, G., Sandhu, R., Kang, M., Park, J.: Injecting RBAC to secure a web-based workflow system. In: Proc. of RBAC 2000. ACM Press, New York (2000)
BPEL. Business process execution language for web services version 1.1, http://www-128.ibm.com/developerworks/library/ws-bpel/
BPEL 2.0 Working Draft. Web services business process execution language version 2.0 (2004), http://www.oasis-open.org/apps/org/workgroup/wsbpel/
Fu, X., Bultan, T., Su, J.: Analysis of interacting BPEL web services. In: Proc. of WWW 2004. ACM Press, New York (2004)
Hinz, S., Schmidt, K., Stahl, C.: Transforming BPEL to Petri Nets. In: van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. LNCS, vol. 3649, pp. 220–235. Springer, Heidelberg (2005)
Ribeiro, C., Guedes, P.: Verifying workflow processes against organization security policies. In: WETICE 1999. IEEE Computer Society Press, Los Alamitos (1999)
SAL. Symbolic analysis laboratory, http://sal.csl.sri.com/
Tan, K., Crampton, J., Gunter, C.: The consistency of task-based authorization constraints in workflow systems. In: Proc. of CSFW 2004 (2004)
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC – a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems 12(4) (2003)
Zhao, X., Cerone, A., Krishnan, P.: Modelling and resource allocation planning of BPEL workflows under security constraints. Technical Report 336, UNU-IIST (2006), http://www.iist.unu.edu/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xiangpeng, Z., Cerone, A., Krishnan, P. (2006). Verifying BPEL Workflows Under Authorisation Constraints. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds) Business Process Management. BPM 2006. Lecture Notes in Computer Science, vol 4102. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11841760_36
Download citation
DOI: https://doi.org/10.1007/11841760_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38901-9
Online ISBN: 978-3-540-38903-3
eBook Packages: Computer ScienceComputer Science (R0)