Skip to main content

2015 | OriginalPaper | Buchkapitel

Aspect-Based Realization of Non-functional Concerns in Business Processes

verfasst von : Anis Charfi, Haolin Zhi

Erschienen in: Networked Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

While functional concerns are well supported in current business process modeling languages such as the Business Process Modeling Notation (BPMN), many important non-functional concerns such as security and quality of service (QoS) cannot be expressed. Some works proposed specific extensions to business process modeling languages to express certain non-functional concerns. However, most related works focus only on expressing non-functional properties in business process models without considering their realization on the implementation level. In this paper, we present a generic approach to non-functional concerns in business processes and bridge the gap between process modeling and process implementation by generating AO4BPEL aspects that enforce and realize the non-functional properties specified in the business process model. The functional part of the processes is realized by generating executable WS-BPEL code out of BPMN process models. The approach is not specific to a particular non-functional concern and the usage of aspects ensures a modular implementation of the business process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 123–126. ACM, June 2012 Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 123–126. ACM, June 2012
2.
Zurück zum Zitat Charfi, A.: Aspect-Oriented Workflow Management. VDM Verlag, Saarbrücken (2008) Charfi, A.: Aspect-Oriented Workflow Management. VDM Verlag, Saarbrücken (2008)
3.
Zurück zum Zitat Charfi, A., Schmeling, B., Heizenreder, A., Mezini M.: Reliable, secure, and transacted web service compositions with AO4BPEL. In: 4th European Conference on Web Services (ECOWS), pp. 23–34, December 2006 Charfi, A., Schmeling, B., Heizenreder, A., Mezini M.: Reliable, secure, and transacted web service compositions with AO4BPEL. In: 4th European Conference on Web Services (ECOWS), pp. 23–34, December 2006
4.
Zurück zum Zitat Fischer, K.P., Bleimann, U., Fuhrmann, W., Furnell, S.M.: Security policy enforcement in BPEL-defined collaborative business processes. In: Proceedings of the 23rd International Conference on Data Engineering (ICDE), pp. 685–694. IEEE, April 2007 Fischer, K.P., Bleimann, U., Fuhrmann, W., Furnell, S.M.: Security policy enforcement in BPEL-defined collaborative business processes. In: Proceedings of the 23rd International Conference on Data Engineering (ICDE), pp. 685–694. IEEE, April 2007
5.
Zurück zum Zitat Gagne, D., Trudel, A.: Time-BPMN. In: Proceedings of the 11th IEEE International Conference on Commerce and Enterprise Computing (CEC), pp. 361–367. IEEE, July 2009 Gagne, D., Trudel, A.: Time-BPMN. In: Proceedings of the 11th IEEE International Conference on Commerce and Enterprise Computing (CEC), pp. 361–367. IEEE, July 2009
6.
Zurück zum Zitat Look, A.: Expressive scoping and pointcut mechanisms for aspect-oriented web service composition. Vorgelegt Diplomarbeit von Alexander Look, Technische Universitaet Darmstadt, September 2011 Look, A.: Expressive scoping and pointcut mechanisms for aspect-oriented web service composition. Vorgelegt Diplomarbeit von Alexander Look, Technische Universitaet Darmstadt, September 2011
7.
Zurück zum Zitat Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: International Conference on Availability, Reliability and Security (ARES), pp. 41–48. IEEE, March 2009 Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: International Conference on Availability, Reliability and Security (ARES), pp. 41–48. IEEE, March 2009
10.
Zurück zum Zitat Ouvans, C., Dumas, M., Ter Hofstede, A.H.M., Van Der Aalst, W.M.P.: From BPMN Process models to BPEL web services. In: Proceedings of the International Conference on Web Services (ICWS), pp. 285–292. IEEE (2006) Ouvans, C., Dumas, M., Ter Hofstede, A.H.M., Van Der Aalst, W.M.P.: From BPMN Process models to BPEL web services. In: Proceedings of the International Conference on Web Services (ICWS), pp. 285–292. IEEE (2006)
11.
Zurück zum Zitat Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security requirements engineering for secure business processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77–89. Springer, Heidelberg (2012) CrossRef Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security requirements engineering for secure business processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77–89. Springer, Heidelberg (2012) CrossRef
12.
Zurück zum Zitat Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. 90(4), 745–752 (2007)CrossRef Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. 90(4), 745–752 (2007)CrossRef
13.
Zurück zum Zitat Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst. E90–D(4), 745–752 (2007)CrossRef Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst. E90–D(4), 745–752 (2007)CrossRef
14.
Zurück zum Zitat Saeedi, K., Zhao, L., Sampaio, P.R.F.: Extending BPMN for supporting customer-facing service quality requirements. In: Proceedings of the 8th IEEE International Conference on Web Services (ICWS), pp. 616–623. IEEE, July 2010 Saeedi, K., Zhao, L., Sampaio, P.R.F.: Extending BPMN for supporting customer-facing service quality requirements. In: Proceedings of the 8th IEEE International Conference on Web Services (ICWS), pp. 616–623. IEEE, July 2010
15.
Zurück zum Zitat Souza, A.R.R., Silva, B.L.B., Lins, F.A.A., Damasceno, J.C., Rosa, N.S., Maciel, P.R.M., Medeiros, R.W.A., Stephenson, B., Motahari-Nezhad, H.R., Li, J., Northfleet, C.: Incorporating security requirements into service composition: from modelling to execution. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol. 5900, pp. 373–388. Springer, Heidelberg (2009) CrossRef Souza, A.R.R., Silva, B.L.B., Lins, F.A.A., Damasceno, J.C., Rosa, N.S., Maciel, P.R.M., Medeiros, R.W.A., Stephenson, B., Motahari-Nezhad, H.R., Li, J., Northfleet, C.: Incorporating security requirements into service composition: from modelling to execution. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol. 5900, pp. 373–388. Springer, Heidelberg (2009) CrossRef
16.
Zurück zum Zitat Turki, S.H., Bellaaj, F., Charfi, A., Bouaziz, R.: Modeling security requirements in service based business processes. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) EMMSAD 2012 and BPMDS 2012. LNBIP, vol. 113, pp. 76–90. Springer, Heidelberg (2012) CrossRef Turki, S.H., Bellaaj, F., Charfi, A., Bouaziz, R.: Modeling security requirements in service based business processes. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) EMMSAD 2012 and BPMDS 2012. LNBIP, vol. 113, pp. 76–90. Springer, Heidelberg (2012) CrossRef
17.
Zurück zum Zitat Weidlich, M., Decker, G., Großkopf, A., Weske, M.: BPEL to BPMN: the myth of a straight-forward mapping. In: Tari, Z., Meersman, R. (eds.) OTM 2008, Part I. LNCS, vol. 5331, pp. 265–282. Springer, Heidelberg (2008) CrossRef Weidlich, M., Decker, G., Großkopf, A., Weske, M.: BPEL to BPMN: the myth of a straight-forward mapping. In: Tari, Z., Meersman, R. (eds.) OTM 2008, Part I. LNCS, vol. 5331, pp. 265–282. Springer, Heidelberg (2008) CrossRef
18.
Zurück zum Zitat Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Archit. 55(4), 211–223 (2009)CrossRef Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Archit. 55(4), 211–223 (2009)CrossRef
19.
Zurück zum Zitat Wolter, C., Schaad, A.: Modeling of task-based authorization constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64–79. Springer, Heidelberg (2007) CrossRef Wolter, C., Schaad, A.: Modeling of task-based authorization constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64–79. Springer, Heidelberg (2007) CrossRef
20.
Zurück zum Zitat Yahya, I., Turki, S.H., Charfi, A., Kallel, S., Bouaziz, R.: An aspect-oriented approach to enforce security properties in business processes. In: Ghose, A., Zhu, H., Yu, Q., Delis, A., Sheng, Q.Z., Perrin, O., Wang, J., Wang, Y. (eds.) ICSOC 2012. LNCS, vol. 7759, pp. 344–355. Springer, Heidelberg (2013) CrossRef Yahya, I., Turki, S.H., Charfi, A., Kallel, S., Bouaziz, R.: An aspect-oriented approach to enforce security properties in business processes. In: Ghose, A., Zhu, H., Yu, Q., Delis, A., Sheng, Q.Z., Perrin, O., Wang, J., Wang, Y. (eds.) ICSOC 2012. LNCS, vol. 7759, pp. 344–355. Springer, Heidelberg (2013) CrossRef
Metadaten
Titel
Aspect-Based Realization of Non-functional Concerns in Business Processes
verfasst von
Anis Charfi
Haolin Zhi
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-26850-7_10