IIT Home Page CNR Home Page

Security policy monitoring of BPMN‐based service compositions

Service composition is a key concept of Service‐Oriented Architecture that allows for combiningloosely coupled services that are offered and operated by different service providers. Suchenvironments are expected to dynamically respond to changes that may occur at runtime,including changes in the environment and individual services themselves. Therefore, it is crucialto monitor these loosely coupled services throughout their lifetime. In this paper, we present anovel framework for monitoring services at runtime and ensuring that services behave as theyhave promised. In particular, we focus on monitoring non‐functional properties that are specifiedwithin an agreed security contract. The novelty of our work is based on the way in whichmonitoring information can be combined from multiple dynamic services to automate themonitoring of business processes and proactively report compliance violations. The frameworkenables monitoring of both atomic and composite services and provides a user friendly interfacefor specifying the monitoring policy. We provide an information service case study using a realcomposite service to demonstrate how we achieve compliance monitoring. The transformationof security policy into monitoring rules, which is done automatically, makes our framework moreflexible and accurate than existing techniques.

Journal of Software: Evolution and Process, 2018

External authors: Muhammad Asim (Department of Computer Science, National University of Computer and Emerging Sciences), Achim Brucker (Department of Computer Science, The University of Sheffield), Thar Baker (Department of Computer Science, Liverpool John Moores University), Qi Shi (Department of Computer Science, Liverpool John Moores University), Brett Lempereur (Department of Computer Science, Liverpool John Moores University)
IIT authors:

Type: Contributo in rivista ISI
Field of reference: Computer Science & Engineering

File: Security Policy Monitoring of BPMN-based Service Compositions -Revision 2 (submitted-v2).pdf

Activity: Sicurezza nel Cloud Computing