based context slicing methods, for mining the ’as-
sets aggregation’ and ’requests aggregation’ from the
service call tuple list that represents a business pro-
cess. Such aggregations decide the partitions of sub-
contexts, where fine-grained security policies can be
applied.
We analyze the sub-context developments, using
’pre-processing’ and ’on-the-fly processing’ strate-
gies, and describe how down-stream provider assets
security is achieved by managing sub-context devel-
opments.
Section (2) introduces the security policy model
we use as foundation for security management. The
Service Dependency Graph (SDG) is also introduced,
based on which we develop a business process slicing
method. Combined with the security policy model,
fine-grained security configuration can be achieved in
a Web Service composition scenario.
Section (3) proposes the SCG-based approach to
describe assets aggregation patterns usually involved
in a business process. Dependency between system
partners, through asset sharing, is represented by the
SCG and corresponding ’service call tuple’.
Section (4) introduces the business process analy-
sis method, illustrated by the motivating use case. We
propose two slicing strategies, namely ’asset-based’
and ’request-based’ slicing, to deal with the scenar-
ios of both pre-processing business process scripts
and on-the-fly analyzing service compositions. Se-
curity analysis can be achieved focusing on each sub-
context, by examining downstream consumers’ secu-
rity profiles with upstream asset providers’ policies.
2 BACKGROUND AND RELATED
WORK
Web Service enables the openess of corporate Infor-
mation System, the inter-operable interaction, agile
work-flow and efficient values exchange. Such fed-
erated business paradigm brings new concerns about
how to configure security among decentralized part-
ners and how to protect resource in life-long scale.
Fitting the open and collaborative Internet-based sys-
tem paradigm, more adaptive attribute-based secu-
rity policies (OASIS, 2005) (Su and Biennier, 2010)
have been brought forward to express enriched secu-
rity factors as well as consumption ’actions’ upon re-
source. When applied to service composition scenar-
ios, full lifecycle security for exchanged assets can be
achieved with analysis of business process and adap-
tion of security policies.
2.1 Attribute-based Security Policy
Model
An attribute-based security policy has the ability to
express fine-grained security factors related to system
entities, through elements as Rights, Conditions and
Obligations (see formula 1).
Assertion = (O, S, R,C, Rn, Ob, L) (1)
The semantics of the factors are as follows: ’O’ (Ob-
ject) is the resource bearing corporate asset value (ser-
vice or information). ’S’ (Subject) is the party that
requests accessing the Right to the resource. ’R’
(Right) is the Operation upon the resource that the
Subject can be allowed to exercise. ’Rn’ (Restriction)
is the constraints upon the Right. For example a re-
striction ’three times’ may be used to refine the right
’rendering a piece of multi-media file’. ’C’ (Con-
dition) is the requirements that must be satisfied for
the Subject to access Rights upon the Object, includ-
ing subject attributes (SAT), object attributes (OAT)
or context related attributes (CNAT) – attributes of
transaction context, environment, infrastructure, etc.
’Ob’ (Obligations) is the action that ’must’ be exer-
cised. For example the obligation ’to delete acquired
data in 10 days’ can be associated to rights like ’read
stock amount’ and ’read client data’. ’L’ (Logic Op-
erator)represents the logic operators as ’imply’(←),
’and’ (∧) and ’or’ (∨).
Such a policy model has the ability to accommo-
date ’point-to-point’ security factors such as the the
subjects and environment attributes. The ’due use’
factors can also be expressed to regulate consump-
tion actions. Nonetheless, such a security model is
oriented to the one-to-one cooperation scenario. In a
Web Service composition scenario, security requires
that an upstream provider’s policy should be met by
downstream consumers that directly or indirectly re-
ceive information assets from the provider, in order to
guarantee end-to-end security to assets. In such con-
texts the asset sharing pattern in the service composi-
tion should be analyzed.
2.2 System Dependency Graph
In a Web Service-based business federation, informa-
tion assets are transferred across organization bound-
aries, possibly merging with other assets. In order to
give a full lifecycle protection to an asset, it’s neces-
sary to capture the asset derivations. This is analo-
gous to program slicing (GrammaTech, ) (Zhao and
Rinard, 2003) based on System Dependency Graph
(SDG) (GrammaTech, ) (Gu et al., 2008). Program
slicing asks about which statements influence (back-
ward slicing), or are influenced by (forward slicing),
ICEIS2013-15thInternationalConferenceonEnterpriseInformationSystems
18