2 research outputs found

    Adaptaciones de workflows para administración de seguridad mediante MDD y aspectos

    Get PDF
    Este documento presenta una propuesta para abordar el problema de adaptación de workflows, mediante la incorporación de propiedades de seguridad a nivel de modelado de proceso de negocio, controlando el impacto de dicha incorporación sobre el proceso que se interviene y la gestión de intereses transversales (concerns) que se entrelazan unos con otros. La pro-puesta define cómo administrar en forma mantenible, reutilizable y extensible los intereses o concerns derivados de las propiedades de seguridad, a nivel de modelos, de acuerdo con el contexto, las variaciones de las normas y requisitos de proceso de negocio, y estándares de seguridad propuestos para entornos de servicios distribuidos.xv, 113 p.This document present a proposal for addressing the problem of workflows adaptation, through the inclusion of security properties at a business modeling level, controlling its impact on the business processes that are intervened, and the management of crosscutting concerns that are woven with each other. The proposal defines how concerns derived from security properties can be managed in a maintainable, reusable and extensible way at model level, according to the context, variations of rules and requirements of business processes, and security standars formulated by distributed services enviroments.Contenido parcial: Fundamentos conceptuales de la adaptación de workflows -- El método ADORE -- Integración del estándar XACML en ADORE -- Visualización de fragmentos de seguridad en el CCCms -- Código de fragmentos de seguridad

    Introducing Security Access Control Policies into Legacy Business Processes

    Get PDF
    International audienceApplying separation of concerns approaches into business process context generally results in several initiatives oriented to automatic generation of aspect code, generation of specific code according to the kind of concern (code for mapping roles and permissions derived from RBAC model for example), or proposition of new mechanisms as dedicated aspectual languages. Most of these initiatives only consider functional behaviours of business process, omitting special behaviours derived from quality attributes such as security, which can be modelled as concerns that must be supported in the business process. In this paper we propose the integration of cross-cuttings standardized control access policies (based on RBAC model and Oasis XACML) into legacy business processes, using a separation of concerns approach
    corecore