Enforcement of entailment constraints in distributed service-based business processes

CONTEXT: A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion...

Description complète

Détails bibliographiques
Publié dans:Information and software technology. - 1998. - 55(2013), 11 vom: 10. Nov., Seite 1884-1903
Auteur principal: Hummer, Waldemar (Auteur)
Autres auteurs: Gaubatz, Patrick, Strembeck, Mark, Zdun, Uwe, Dustdar, Schahram
Format: Article
Langue:English
Publié: 2013
Accès à la collection:Information and software technology
Sujets:Journal Article Business process management Entailment constraints Identity and access management Service-Oriented Architecture (SOA) WS-BPEL
LEADER 01000caa a22002652 4500
001 NLM264692306
003 DE-627
005 20250220170052.0
007 tu
008 231224s2013 xx ||||| 00| ||eng c
028 5 2 |a pubmed25n0882.xml 
035 |a (DE-627)NLM264692306 
035 |a (NLM)27667903 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Hummer, Waldemar  |e verfasserin  |4 aut 
245 1 0 |a Enforcement of entailment constraints in distributed service-based business processes 
264 1 |c 2013 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Date Revised 01.10.2020 
500 |a published: Print 
500 |a Citation Status PubMed-not-MEDLINE 
520 |a CONTEXT: A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion and binding constraints, are important means to control process execution. Mutually exclusive tasks result from the division of powerful rights and responsibilities to prevent fraud and abuse. In contrast, binding constraints define that a subject who performed one task must also perform the corresponding bound task(s) 
520 |a OBJECTIVE: We aim to provide a model-driven approach for the specification and enforcement of task-based entailment constraints in distributed service-based business processes 
520 |a METHOD: Based on a generic metamodel, we define a domain-specific language (DSL) that maps the different modeling-level artifacts to the implementation-level. The DSL integrates elements from role-based access control (RBAC) with the tasks that are performed in a business process. Process definitions are annotated using the DSL, and our software platform uses automated model transformations to produce executable WS-BPEL specifications which enforce the entailment constraints. We evaluate the impact of constraint enforcement on runtime performance for five selected service-based processes from existing literature 
520 |a RESULTS: Our evaluation demonstrates that the approach correctly enforces task-based entailment constraints at runtime. The performance experiments illustrate that the runtime enforcement operates with an overhead that scales well up to the order of several ten thousand logged invocations. Using our DSL annotations, the user-defined process definition remains declarative and clean of security enforcement code 
520 |a CONCLUSION: Our approach decouples the concerns of (non-technical) domain experts from technical details of entailment constraint enforcement. The developed framework integrates seamlessly with WS-BPEL and the Web services technology stack. Our prototype implementation shows the feasibility of the approach, and the evaluation points to future work and further performance optimizations 
650 4 |a Journal Article 
650 4 |a Business process management 
650 4 |a Entailment constraints 
650 4 |a Identity and access management 
650 4 |a Service-Oriented Architecture (SOA) 
650 4 |a WS-BPEL 
700 1 |a Gaubatz, Patrick  |e verfasserin  |4 aut 
700 1 |a Strembeck, Mark  |e verfasserin  |4 aut 
700 1 |a Zdun, Uwe  |e verfasserin  |4 aut 
700 1 |a Dustdar, Schahram  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t Information and software technology  |d 1998  |g 55(2013), 11 vom: 10. Nov., Seite 1884-1903  |w (DE-627)NLM098214314  |x 0950-5849  |7 nnns 
773 1 8 |g volume:55  |g year:2013  |g number:11  |g day:10  |g month:11  |g pages:1884-1903 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 55  |j 2013  |e 11  |b 10  |c 11  |h 1884-1903