Asim, M, Yautsiukhin, A, Brucker, A, Baker, T, Shi, Q and Lempereur, B (2018) Security Policy Monitoring of BPMN-based Service Compositions. Journal of Software: Evolution and Process. ISSN 2047-7473
|
Text
Security Policy Monitoring of BPMN-based Service Compositions -Accepted Version.pdf - Accepted Version Download (1MB) | Preview |
Abstract
Service composition is a key concept of Service-Oriented Architecture that allows for combining loosely coupled services that are offered and operated by different service providers. Such environments are expected to dynamically respond to changes that may occur at runtime, including changes in the environment and individual services themselves. Therefore, it is crucial to monitor these loosely-coupled services throughout their lifetime. In this paper, we present a novel framework for monitoring services at runtime and ensuring that services behave as they have promised. In particular, we focus on monitoring non-functional properties that are specified within an agreed security contract. The novelty of our work is based on the way in which monitoring information can be combined from multiple dynamic services to automate the monitoring of business processes and proactively report compliance violations. The framework enables monitoring of both atomic and composite services and provides a user friendly interface for specifying the monitoring policy. We provide an information service case study using a real composite service to demonstrate how we achieve compliance monitoring. The transformation of security policy into monitoring rules, which is done automatically, makes our framework more flexible and accurate than existing techniques.
Item Type: | Article |
---|---|
Additional Information: | This is the peer reviewed version of the following article:Asim M, Yautsiukhin A, Brucker AD, Baker T, Shi Q, Lempereur B. Security policy monitoring of BPMN-based service compositions. J Softw Evol Proc. 2018 which has been published in final form at https://doi.org/10.1002/smr.1944. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Computer Science & Mathematics |
Publisher: | Wiley |
Date Deposited: | 16 Jan 2018 14:45 |
Last Modified: | 04 Sep 2021 03:24 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/7862 |
View Item |