Specification of Security Policy for Compliance Assessment of CBPs

  • Klaus-Peter Fischer-Hellmann
Part of the IT im Unternehmen book series (ITU, volume 1)


The analysis of BPEL as a specification language in the former chapter has revealed the potential of violating security policy-implied restrictions to Web service invocation, in particular with respect to information flow of values passed to and returned from Web services. From the outset, one major aim was to define methods that support assessment of remotely defined business processes for compliance with security policies in force at the location of execution. This chapter introduces novel approaches to security policy enforcement based on the results presented in Chapter 4.


Business Process Output Parameter Security Policy Conformance Testing Implementation Under Test 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden 2012

Authors and Affiliations

  • Klaus-Peter Fischer-Hellmann
    • 1
  1. 1.MühltalGermany

Personalised recommendations