Generating WS-SecurityPolicy Documents via Security Model Transformation
نویسنده
چکیده
When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development. A crucial part of SOA-based business process design is the ability to define security properties for the service invocations. Thus, a business process modeling tool must provide appropriate models and capabilities to specify these properties on a semantical level in order to automatically create technical realizations at the implementation layer. In this paper, we outline a model-driven approach for adding security properties to a business process model. The approach consists of a security model definition, an appropriate model transformation, and a model-specific technical realization based on the Web Services technology (i.e. WS-BPEL and WS-SecurityPolicy). The Security Model Approach When it comes to the issue of specifying security properties on a process level, the conjunction of the WS-BPEL and WS-SecurityPolicy specifications is lacking completeness. Though both specifications rely on the Web Service description (WSDL), there is no possibility for specifying security properties at the process level, e.g. end-to-end encryption of particular data items within the complete business process execution. Thus, it is necessary to investigate the requirements of enabling security policy assertions to directly annotate the process document without intermediating the WSDL. This can be addressed by using the model-driven approach. The idea is to create a separate security model view for the process model, which directly annotates the communication parts of the underlying process model. Thus, the process model can be defined by a business-semantics-aware process developer, and can then be annotated with appropriate security properties by a separate security architect (cmp. Figure 1). Then, both the process model and the security model can be tranformed into appropriate process and security descriptions (based on WS-BPEL and WS-SecurityPolicy), which are related in that the security description directly annotates the process description. Once these descriptions are deployed to an appropriate Web Ser-
منابع مشابه
Automatic Transformation of Generic , Validated Business Process Security Models to WS - SecurityPolicy Descriptions
An increasing need for security in SOA applications demands for better support for the management of security in Web-based business processes. Here, the model-driven process development may provide valuable opportunities in terms of maintainability and deployment. Besides modeling and then generating the pure functionality of a process, the consideration of security properties at the level of a...
متن کاملSemantic Matching of WS-SecurityPolicy Assertions
The lack of semantics in WS-SecurityPolicy (WS-SP) hampers the effectiveness of matching the compatibility between WS-SP assertions. To resolve this problem, we present in this paper a semantic approach for specifying and matching the security assertions. The approach consists in the transformation of WS-SP into an OWL-DL ontology and the definition of a set of semantic relations that can exist...
متن کاملProfiles for conveying the secure communication requirements of Web services
The lack of a single authority in the Grid environment is perhaps the biggest source of security and interoperability challenges faced by Grid systems designers. A strong commitment to meaningful, interoperable security is crucial for fostering Grid adoption and buy-in. The issues of securityinteroperability are twofold: (a) grids require federation of distinct trust and security domains, and (...
متن کاملWS-SecurityPolicy Decision and Enforcement for Web Service Firewalls
A known weakness of Web Services is their vulnerability to Denial of Service attacks exploiting XML processing characteristics. To protect Web Services from these attacks, extended validation of SOAP messages—considering WS-Security and WS-SecurityPolicy—is made. For SOAP security is message oriented, the processing of the security content itself is vulnerable to Denial of Service attacks. Henc...
متن کاملEvent-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services
To enable checking of SOAP messages for compliance to a given security policy, extensions to the classical “Schema-only” validation of SOAP messages are required. These extensions check, if the WS-Security elements found in a SOAP message fulfill the Web Service security specification that is laid down in the WS-SecurityPolicy document. In this paper, we discuss to what extent the proposed exte...
متن کامل