Skip to main content

Accountability-Based Compliance Control of Collaborative Business Processes in Cloud Systems

  • Chapter
  • First Online:
Security, Privacy and Trust in Cloud Systems

Abstract

The correctness of the inter-organizational collaboration in the Cloud relies on the individual correctness of all participants. That is, if the collaborator is compliant to the pre-defined business process, or Service Level Agreement (SLA).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    XML Process Definition Language (XPDL) http://www.wfmc.org/xpdl.html

References

  1. Abraham T (2006) Event sequence mining to develop profiles for computer forensic investigation purposes. In: Australasian workshops on Grid computing and e-research. pp 145–153

    Google Scholar 

  2. Barford P, Sommers J (2004) Comparing probe-and router-based packet-loss measurement. IEEE Tans Internet Comput 8(5):50–56 (sep 2004)

    Google Scholar 

  3. Castro M, Liskov B (2002) Practical byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst 20(4):398–461

    Article  Google Scholar 

  4. Chase J, Yumerefendi A (2004) Trust but verify:accountability for network services. In: ACM SIGOPS European Workshop

    Google Scholar 

  5. Daniel F, Casati F, D’Andrea V (2009) Business compliance governance in service-oriented architectures. In: International Conference on Advanced Information Networking and Applications. pp 113–120

    Google Scholar 

  6. Druschel P, Haeberlen A, Kouznetsov P (2007) Peerreview: practical accountability for distributed systems. In: ACM SIGOPS symposium on Operating systems principles. pp 175–188

    Google Scholar 

  7. Du Y, Jiang C, Zhou M (2009) A petri net-based model for verification of obligations and accountability in cooperative systems. IEEE Trans Syst Man Cybern 39(2):299–308

    Article  Google Scholar 

  8. Haeberlen A (April 2010) A case for the accountable cloud. In: ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware, vol 44(2), pp 52–57

    Google Scholar 

  9. Haeberlen A, Aditya P, Rodrigues R, Druschel P (2010) Accountable virtual machines. In: USENIX conference on Operating systems design and implementation. pp 1–16

    Google Scholar 

  10. Haeberlen A, Druschel P, Kouznetsov P (2006) The case for byzantine fault detection. In: Conference on Hot Topics in System Dependability. pp 5–10

    Google Scholar 

  11. Haeberlen A, Kouznetsov P, Druschel P (2007) Peerreview: Practical accountability for distributed systems. Technical report, Max Planck Institute for Software Systems (Mar 2007)

    Google Scholar 

  12. Hartog J, Dekker M, Corin R, Etalle S, Cederquist J (2005) An audit logic for accountability. In: International Workshop on Policies for Distributed Systems and, Networks. pp 34–43

    Google Scholar 

  13. Huang M, Peterson L, Bavier A (20006) Planetflow: maintaining accountability for network services. In: ACM SIGOPS Operating Systems, Review. pp 89–94

    Google Scholar 

  14. Korb K, Nicholson A (2004) Bayesian artificial intelligence. Chapman & Hall/CRC, London

    MATH  Google Scholar 

  15. Lamport L (1983) The weak byzantine generals problem. J ACM 30(3):668–676

    Article  MathSciNet  MATH  Google Scholar 

  16. Lin KJ, Chang S (2009) A service accountability framework for qos service management and engineering. Inf Syst E-Bus Manag 7:429–446, 10.1007/s10257-009-0109-5

    Google Scholar 

  17. Lin KJ, Panahi M, Zhang Y, Zhang J, Chang SH (2009) Building accountability middleware to support dependable soa. IEEE Trans Internet Comput 13(2):16–25 (mar 2009)

    Google Scholar 

  18. Mulo E, Zdun U, Dustdar S (2009) Monitoring web service event trails for business compliance. In: International Conference on Service-Oriented Computing and Applications. pp 1–8

    Google Scholar 

  19. Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541–580

    Google Scholar 

  20. Palankar M, Iamnitchi A., Ripeanu M, Garfinkel S (2008) Amazon s3 for science grids: a viable solution. In: Workshop on Data-aware, distributed Computing. pp 55–64

    Google Scholar 

  21. Rik E, Juliane D (2003) Reactive petri nets for workflow modeling. In: International Conference on Applications and Theory of Petri Nets. pp 296–315

    Google Scholar 

  22. Roughan M (2005) Fundamental bounds on the accuracy of network performance measurements. In: ACM SIGMETRICS international conference on Measurement and modeling of computer systems. pp 253–264

    Google Scholar 

  23. Rozinat A, Aalst W (2006) Conformance testing: measuring the fit and appropriateness of event logs and process models. In: Workshop on Business Process, Intelligence. pp 163–176

    Google Scholar 

  24. Schumm D, Leymann F, Ma Z, Scheibler T, Strauch S (2010) Integrating compliance into business processes. In: Multikonferenz Wirtschaftsinformatik

    Google Scholar 

  25. Shirey R (2007) Trustworthy system definition, at IETF RFC 4949 (Aug 2007), http://tools.ietf.org/html/rfc4949

  26. Sommers J, Barford P, Duffield N, Ron A (2007) Accurate and efficient sla compliance monitoring. SIGCOMM Comput Commun Rev 37(4):109–120

    Article  Google Scholar 

  27. Sommers J, Barford P, Duffield N, Ron A (2005) Improving accuracy in end-to-end packet loss measurement. In: Conference on Applications, technologies, architectures, and protocols for computer communications, pp 157–168. ACM, New York, NY, USA

    Google Scholar 

  28. Sommers J, Barford P, Duffield N, Ron A (2010) Multiobjective monitoring for sla compliance. IEEE/ACM Trans Netw 18(2):652–665 (Apr 2010)

    Google Scholar 

  29. Van der Aalst WMP, Dumas M, Ouyang C, Rozinat A, Verbeek E (2008) Conformance checking of service behavior. ACM Trans Internet Technol 8(3):1–30

    Google Scholar 

  30. Wang C, Chen S, Zic J (2009) A contract-based accountability service model. In: IEEE International Conference on Web Services. pp 639–646

    Google Scholar 

  31. Xiong Q, Zhang H, Meng B (2005) The practical detailed requirements of accountability and its application in the electronic payment protocols. In: IEEE International Conference on e-Technology, e-Commerce and e-Service. pp 556–561

    Google Scholar 

  32. Yao J, Chen S, Wang C, Levy D, Zic J (2010) Accountability as a service for the cloud. In: IEEE International Conference on Services, Computing. pp 81–90

    Google Scholar 

  33. Yao J, Chen S, Wang C, Zic J, Levy D (2010) Accountability as a service for the cloud: from concept to implementation with bpel. In: World Congress on Services (SERVICES). pp 91–100

    Google Scholar 

  34. Yumerefendi AR, Chase JS (2007) Strong accountability for network storage. ACM Trans Storage 3(3):11

    Article  Google Scholar 

  35. Yumerefendi A, Chase J (2005) The role of accountability in dependable distributed systems. In First Workshop on Hot Topics in System Dependability

    Google Scholar 

  36. Zhang Y, Lin KJ, Hsu J (2007) Accountability monitoring and reasoning in service-oriented architectures. SOCA 1:35–50, 10.1007/s11761-007-0001-4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinhui Yao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yao, J., Chen, S., Levy, D. (2014). Accountability-Based Compliance Control of Collaborative Business Processes in Cloud Systems. In: Nepal, S., Pathan, M. (eds) Security, Privacy and Trust in Cloud Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38586-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38586-5_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38585-8

  • Online ISBN: 978-3-642-38586-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics