6 CONCLUSIONS
We have presented an MDE solution to functional se-
curity management in service-oriented IS. Security
policies can be comprehensively described in a sin-
gle specification language called EB
3
SEC, which in-
tegrates traditional RBAC-like access control poli-
cies, using its security data model, and stateful con-
trol rules using a process algebra or ASTDs. EB
3
SEC
can be automatically implemented using symbolic
computation, thereby streamlining policy evolution.
EB
3
SEC is amenable to automated analysis using
model-checking techniques. We are currently experi-
menting several model checkers to determine the most
appropriate one. We are also investigating the trans-
lation of EB
3
SEC policies into BPEL policies, to pro-
vide a more standard implementation.
EB
3
SEC subsumes RBAC organizational control
principles like separation of duties, delegation of
rights and hierarchical structuring of concepts. These
can all be express as elements of a security class
diagram and their semantics defined using a first-
order predicate. EB
3
SEC goes beyond access con-
trol rules typically expressed in RBAC-like policies
and XACML, by taking into account stateful rules,
i.e. rules that can deal with the history of service re-
quests to determine the authorization of the next re-
quests. These stateful rules are abstractly described
using a process algebra or ASTDs. In an RBAC or
XACML approach, stateful business rules are sepa-
rately described in a conventional programming lan-
guage, hence are hard to modify and analyse. Ap-
proaches based on workflows can also be expressed in
EB
3
SEC. Our process algebra and ASTDs offer more
powerful modeling mechanisms than BPEL, which
streamlines the specification of workflow constraints.
For instance, synchronisation, quantification, and ac-
cess to state variables in guards can be used to model
complex ordering constraints. Timing constraints can
also be represented through the use of action time-
stamps, guards and time attributes in the security class
diagram.
REFERENCES
Amstel, M. F. V., van den Brand, M. G. J., Proti, Z., and
Verhoeff, T. (2008). Transforming process algebra
models into UML state machines: Bridging a seman-
tic gap? In Theory and Practice of Model Transfor-
mations, volume 5063 of Lecture Notes in Computer
Science, pages 61–75. Springer Berlin / Heidelberg.
Bhatti, R., Sanz, D., Bertino, E., and Ghafoor, A. (2007).
A policy-based authorization framework for web ser-
vices: Integrating xgtrbac and ws-policy. In Web Ser-
vices, 2007. ICWS 2007. IEEE International Confer-
ence on, pages 447 –454.
Chirichiello, A. and Sala¨un, G. (2007). Encoding process
algebraic descriptions of web services into bpel. Web
Intelli. and Agent Sys., 5(4):419–434.
Ferraiolo, D., Kuhn, D., and Chandramouli, R. (2003).
Role-based access control. Artech House Publishers.
Fraikin, B. and Frappier, M. (2002). EB3PAI: an Interpreter
for the EB
3
Specification Language. In Haneberg, D.,
Schellhorn, G., and Reif, W., editors, 5th Workshop on
Tools for System Design and Verification (FM-TOOLS
2002), proceedings, Reisensburg Castle, G¨unzburg,
Germany.
Fraikin, B. and Frappier, M. (2009). Efficient symbolic
computation of process expressions. Science of Com-
puter Programming, 74(9):723 – 753. Special Issue
on the Fifth International Workshop on Foundations of
Coordination Languages and Software Architectures
(FOCLASA’06).
Frappier, M., Gervais, F., Laleau, R., Fraikin, B., and St-
Denis, R. (2008). Extending statecharts with process
algebra operators. Innovations in Systems and Soft-
ware Engineering, 4(3):285–292.
Frappier, M. and St-Denis, R. (2003). EB
3
: an entity-based
black-box specification method for information sys-
tems. Software and Systems Modeling, 2(2):134–149.
ICTI (2010). Carnegie mellon | portugal program.
interfaces - certified interfaces for integrity and
security in extensible web-based applications.
http://www.cmuportugal.org/tiercontent.aspx?id=
1564&ekmensel=568fab5c 68 0 1564 6.
Joshi, J., Bertino, E., Latif, U., and Ghafoor, A. (2005). A
generalized temporal role-based access control model.
Knowledge and Data Engineering, IEEE Transactions
on, 17(1):4 – 23.
Kalam, A. A. E., Benferhat, S., Mi`ege, A., Baida, R. E.,
Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., and
Trouessin, G. (2003). Organization based access con-
trol. Policies for Distributed Systems and Networks,
IEEE International Workshop on, 0:120.
Meinel, C. (2009). Soa — security. hasso-plattner-institut
f¨ur softwaresystemtechnik. http://www.hpi.uni-
potsdam.de/meinel/research/security engineering/
soasecurity1.html.
ORKA (2009). The orka consortium. germany. http://
www.organisatorische-kontrolle.de/index-en.htm.
SELKIS (2009). Project anr-08-segi-018. france. http://
lacl.fr/selkis/.
MODEL-DRIVEN ENGINEERING OF FUNCTIONAL SECURITY POLICIES
379