365 research outputs found
Distributed aspect-oriented service composition for business compliance governance with public service processes
Service-Oriented Architecture (SOA) offers a technical foundation for Enterprise Application Integration and
business collaboration through service-based business components. With increasing process outsourcing and cloud computing, enterprises need process-level integration and collaboration (process-oriented) to quickly launch new business processes for new customers and products. However, business processes that cross organisationsā compliance regulation boundaries are still unaddressed. We introduce a distributed aspect-oriented service composition approach, which enables multiple process clients hot-plugging their business compliance models (business rules, fault handling policy, and execution monitor) to BPEL business processes
Context constraint integration and validation in dynamic web service compositions
System architectures that cross organisational boundaries are usually implemented based on Web service technologies due to their inherent interoperability benets. With increasing exibility requirements, such as on-demand service provision, a dynamic approach to service architecture focussing on composition at runtime is needed. The possibility of technical faults, but also violations of functional and semantic constraints require a comprehensive notion of context that captures composition-relevant aspects. Context-aware techniques are consequently required to support constraint validation for dynamic service composition. We present techniques to respond to problems occurring during the execution of dynamically composed Web
services implemented in WS-BPEL. A notion of context { covering physical and contractual
faults and violations { is used to safeguard composed service executions dynamically. Our aim is to present an architectural framework from an application-oriented perspective, addressing practical considerations of a technical framework
Self-supervising BPEL Processes
Service compositions suffer changes in their partner services. Even if the composition does not change, its behavior may evolve over time and become incorrect. Such changes cannot be fully foreseen through prerelease validation, but impose a shift in the quality assessment activities. Provided functionality and quality of service must be continuously probed while the application executes, and the application itself must be able to take corrective actions to preserve its dependability and robustness. We propose the idea of self-supervising BPEL processes, that is, special-purpose compositions that assess their behavior and react through user-defined rules. Supervision consists of monitoring and recovery. The former checks the system's execution to see whether everything is proceeding as planned, while the latter attempts to fix any anomalies. The paper introduces two languages for defining monitoring and recovery and explains how to use them to enrich BPEL processes with self-supervision capabilities. Supervision is treated as a cross-cutting concern that is only blended at runtime, allowing different stakeholders to adopt different strategies with no impact on the actual business logic. The paper also presents a supervision-aware runtime framework for executing the enriched processes, and briefly discusses the results of in-lab experiments and of a first evaluation with industrial partners
SECURITY POLICY ENFORCEMENT IN APPLICATION ENVIRONMENTS USING DISTRIBUTED SCRIPT-BASED CONTROL STRUCTURES
Business processes involving several partners in different organisations impose demanding
requirements on procedures for specification, execution and maintenance. A
framework referred to as business process management (BPM) has evolved for this purpose
over the last ten years. Other approaches, such as service-oriented architecture
(SOA) or the concept of virtual organisations (VOs), assist in the definition of architectures
and procedures for modelling and execution of so-called collaborative business
processes (CBPs).
Methods for the specification of business processes play a central role in this context,
and, several standards have emerged for this purpose. Among these, Web Services
Business Process Execution Language (WS-BPEL, usually abbreviated BPEL) has
evolved to become the de facto standard for business process definition. As such, this
language has been selected as the foundation for the research in this thesis.
Having a broadly accepted standard would principally allow the specification of
business processes in a platform-independent manner, including the capability to
specify them at one location and have them executed at others (possibly spread across
different organisations). Though technically feasible, this approach has significant
security implications, particularly on the side that is to execute a process.
The research project focused upon these security issues arising when business processes
are specified and executed in a distributed manner. The central goal has been the
development of methods to cope with the security issues arising when BPEL as a
standard is deployed in such a way exploiting the significant aspect of a standard to be
platform-independent
The research devised novel methods for specifying security policies in such a manner
that the assessment of compliance with these policies is greatly facilitated such that the
assessment becomes suited to be performed automatically. An analysis of the securityrelevant
semantics of BPEL as a specification language was conducted that resulted in
the identification of so-called security-relevant semantic patterns. Based on these
results, methods to specify security policy-implied restrictions in terms of such semantic
patterns and to assess the compliance of BPEL scripts with these policies have been
developed. These methods are particularly suited for assessment of remotely defined
BPEL scripts since they allow for pre-execution enforcement of local security policies
thereby mitigating or even removing the security implications involved in distributed
definition and execution of business processes.
As initially envisaged, these methods are comparatively easy to apply, as they are based
on technologies customary for practitioners in this field. The viability of the methods
proposed for automatic compliance assessment has been proven via a prototypic
implementation of the essential functionality required for proof-of-concept.Darmstadt Node of the NRG Network at University of Applied Sciences Darmstad
A distributed architecture for policy-customisable multi-tenant Processes-as-a-Service
Service-based business processes are often developed and deployed by single organizations. In distributed, shared resource environments like the cloud on the other hand, consumers share resources owned by cloud providers.
%Higher levels of resource sharing gives more economy of scale for providers in the software-as-a-service (SaaS) or business process-as-a-service (BPaaS) space.
This requires multi-tenancy capability for service processes that provides customized behaviour for on shared process implementations to meet the varying needs of different process consumers as tenants of the process resource.
In this paper, we define a distributed multi-tenant architecture for BPEL processes provided as a service. A single-version BPEL process is deployed by a provider and offered for all process consumers, combined with a customization and management functionality to create a unique experience for different consumers (process tenants). We provide two core components: a policy model for consumers to express customization/business requirements of service processes and a coordination framework for policy enforcement between consumers and providers to achieve on-the-fly customization of service processes
A Classification of BPEL Extensions
The Business Process Execution Language (BPEL) has emerged as de-facto standard for business processes implementation. This language is designed to be extensible for including additional valuable features in a standardized manner. There are a number of BPEL extensions available. They are, however, neither classified nor evaluated with respect to their compliance to the BPEL standard. This article fills this gap by providing a framework for classifying BPEL extensions, a classification of existing extensions, and a guideline for designing BPEL extensions
- ā¦