Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment

التفاصيل البيبلوغرافية
العنوان: Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment
المؤلفون: Sameera Ghayyur, Arif Ghafoor, Basit Shafiq, Abdulrahman Almutairi, Ammar Masood, Farrukh Khan, Zahid Pervaiz
المصدر: IEEE Transactions on Dependable and Secure Computing. 14:478-493
بيانات النشر: Institute of Electrical and Electronics Engineers (IEEE), 2017.
سنة النشر: 2017
مصطلحات موضوعية: Business process, Computer science, Windows Workflow Foundation, Distributed computing, 020207 software engineering, 02 engineering and technology, Security policy, Workflow engine, Workflow technology, Workflow, Composability, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Workflow management system
الوصف: The emergence of cloud computing infrastructure and Semantic Web technologies has created unprecedented opportunities for composing large-scale business processes and workflow-based applications that span multiple organizational domains. A key challenge related to composition of such multi-organizational business processes and workflows is posed by the security and access control policies of the underlying organizational domains. In this paper, we propose a framework for verifying secure composability of distributed workflows in an autonomous multi-domain environment. The objective of workflow composability verification is to ensure that all the users or processes executing the designated workflow tasks conform to the time-dependent security policy specifications of all collaborating domains. A key aspect of such verification is to determine the time-dependent schedulability of distributed workflows, assumed to be invoked on a recurrent basis. We use a two-step approach for verifying secure workflow composability. In the first step, a distributed workflow is decomposed into domain-specific projected workflows and is verified for conformance with the respective domain's security and access control policy. In the second step, the cross-domain dependencies amongst the workflow tasks performed by different collaborating domains are verified.
تدمد: 1545-5971
DOI: 10.1109/tdsc.2015.2481881
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::cefa025f43932acaadaff8f46cfd1234
https://doi.org/10.1109/tdsc.2015.2481881
Rights: CLOSED
رقم الانضمام: edsair.doi...........cefa025f43932acaadaff8f46cfd1234
قاعدة البيانات: OpenAIRE
الوصف
تدمد:15455971
DOI:10.1109/tdsc.2015.2481881