Architecture Of Access Control Mechanism In Run Time Change Management

Architecture Of Access Control Mechanism In Run Time Change Management

Source publication
Article
Full-text available
Enterprises implement their business process as web services in order to meet the market demand. Typically composite business process requires collection of services under composition along with real time access control to provide the integrated functionalities to the consumer by orchestrating the service functionalities in a meaningful manner. Com...

Context in source publication

Context 1
... good idea of managing changes is given in [3][4] but still no solid work is done regarding run time issues in both [3] and [4].The section 2 gives the related works, section 3 describes the architecture for the access control mechanism, section 4 explains the context analysis based on the order of execution, section 5 gives information of the schematic representation of the access points with the help of flow graphs, section 6 gives the change measurability based on the alignment changes, section 7 concludes the paper with references in section 8 . Figure 1 shows the workflow of how the access control mechanism is done in dynamic change management framework. When a change request is raised , context analysis is done to retrieve the logics and the business parties in which the change has to be made. ...

Similar publications

Conference Paper
Full-text available
Identifying the processes in the cadastre enables understanding the principles on which the cadastre works and the needs for its improvement. These processes define the way how the cadastre manages information and what are the prerequisites for the data to be stored in the appropriate data structure. The first step in determining the set of process...
Article
Full-text available
Web Services are the current most promising technology based on the concept of Service Oriented Computing that provides the basis for the development and execution of business processes that are distributed over the network and available via standard interfaces and protocols. Quality of Services (QoS) represents a major issue that covers the challe...
Article
Full-text available
Saat ini, ERP (Enterprise Resource Planning) bergerak menuju layanan SaaS (Software as a Service) dan Multi-Tenancy, di mana aplikasi ERP melayani beberapa penyewa dengan proses bisnis yang berbeda dalam lingkungan berbasisweb service. Pada kasus Provider ERP, sangat penting untuk mencapai fleksibilitas proses bisnis penyewa sebagaimana didefinisik...
Article
Full-text available
Service Oriented Architecture (SOA) introduced the web services as distributed computing components that can be independently deployed and invoked by other services or software to provide simple or complex tasks. In this paper we propose a novel approach to solve the problem of the business processes execution engine web service selection and servi...
Article
Full-text available
Objectives This paper describes an experience of implementing seamless service trials online and offline by adopting Internet of Things (IoT) technology based on near-field communication (NFC) tags and Bluetooth low-energy (BLE) beacons. The services were provided for both patients and health professionals. Methods The pilot services were implemen...

Citations

... These security techniques, combined with WS-Security (WSS), guarantee the control of access to the exchanged messages. An access control mechanism is discussed in [21]. It is implemented with a finite state machine. ...
Article
Full-text available
span lang="EN-US">This paper presents the results obtained from a comparative analysis of two methods for experimental data sharing. Several works related to the topic and some approaches for processing data have been discussed. Different technolgoies related to the web services , ways of using them and the areas of their application are analyzed. For the purposes of the study, a web service for retrieving specific data from a behavioral experiments database was de veloped . The methodology and conditions for conducting the experiments are described. T wo different indicators a re analyzed, respectively: time to retrieve the data from a database and iteration time across all records through one loop . The results show that when retrieving thousands of records both web service based approach and an approach based on a remote database server can be used. However, when retrieving millions of records , the fastest approach was the one that uses remote database server . T he obtained results show that the dynamic arrays (containing strings) iterated much faster across all data records than the dataset approach.</span
... Definition 5: User Context. Given a user U and each graph from its set of flowcharts SOF U , the User Context of user U (UC U ) is a pair of elements containing the current UAP on step N (UAP N ) and a set of previously accessed nodes by user U, which can be referenced by the predicate AccessedSet(UC U ). (10) This UC U is updated each time a Stepping operation occurs and it can be used by a node to obtain values to parametrize the data access. This means that the user does not provide the parameters himself, ensuring that the data is valid and that the user can request it. ...
Conference Paper
Web service present more interoperability and connectivity between the services. Now a days web service technology is been popularly used to implement information system as service oriented applications. As Security become predominant in case of web service WS- policy and WS-security is used where WS-policy discuss the constraint and capabilities of web service and WS-security says about specification that defines how security measures are applied in web services to safeguard them from external attacks. But still some flaws are present in implementations and standards in regard to web service security. Web service composition is done using WS-BPEL. BPEL checks for the process execution but still security validation fails to happen in execution, hence LBA (Linear Bounded Automata) is a technique which is implemented in WS-BPEL to completely analyze the security aspect in BPEL and verify the security presence in each stages before moving to next stage.