<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Flexible Integration of Security Concern in Rule based Business Process modeling</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Khadhir Bekki</string-name>
          <email>Bekki_kh@Yahoo.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hafida Belbachir</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer science, Ibn khaldoune University</institution>
          ,
          <addr-line>Tiaret</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer science, Mohamed Boudiaf University</institution>
          ,
          <addr-line>Oran</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <fpage>222</fpage>
      <lpage>231</lpage>
      <abstract>
        <p>Today, to stay competitive, organizations are in the quest to execute their business processes correctly and continuously. This need require to apply risk, security and business process management in a more integrated way. At the same time, business processes need to be more flexible and adaptable. Habitually, The business rules represent main driving force for adaptability and competitiveness in organizations. The ECA (Event-condition-action) is a popular way to incorporate flexibility into a process design. As well, separation of concerns becomes one of the cornerstone principle in software engineering, and it supports adaptation in several ways. In this paper, we propose a flexible way to integrate security concern into rule based business process modeling. First, we govern any business activity through our ECATE formalism (EventCondition-Action-Temporal condition- trigger Event) based on business rules. Then, we integrate the security requirements in a separate concern as EUCATE rules (a variant of ECATE rule). The rules based process will verified before being deployed in the runtime environment</p>
      </abstract>
      <kwd-group>
        <kwd>Business processes modeling</kwd>
        <kwd>business rules</kwd>
        <kwd>flexible modeling</kwd>
        <kwd>separation of concerns</kwd>
        <kwd>security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Actually, companies are more to more in the quest to execute their business processes
correctly and continuously. Within the last years, the private sector has noticed a
growing need to improve security to meet tighter regulative and legal
requirements[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This need forced organizations to integrate the capture of security
requirement in the business process modeling.
      </p>
      <p>
        The early design of security requirements have some benefits [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] (1) use the security
knowledge of security business process analysts at high level in modeling step.
(2)reduce potential costs avoiding the additional implementation of business
processes security after the implementation of business process. (3) simplify the capturing of
the security requirements. As well, flexibility, adaptability and correctness, besides
knowledge-intensiveness belong to the most challenging issues of business
process[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The BPEL language does not provide any support for the specification of either
authorization policies or authorization constraints on the execution of activities
composing a business process [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. It is important that such an authorization model be
highlevel and expressed in terms of entities that are relevant from the organizational
perspective [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The regulations and policies in organizations are often expressed in
terms of business rules that are sometimes defined as high-level structured statements
that constrain, control, and influence the business logic [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Business rules are defined
as[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]: ”the set of policies for regulating the whole business within and out-side an
organization”. They represent main driving force for adaptability and
competitiveness. The ECA pattern has been widely adopted for business rules [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. They are an
interest way to incorporate flexibility into a process design. And, they are a popular
approach to catch unanticipated events and adapt to exceptions [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        As well, separation of concerns provides a way to separate development of the
functionality and the crosscutting concerns (e.g., quality of service, security). This
principle has become one of the cornerstone principle in software engineering, and has lead
to a wide spread of aspect-oriented programming(AOP) approach [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
The advantages in addressing each concern separately are transparency, evolution,
understandability and scalability. More, it is necessary to bring them together to
understand which global system properties emerge at any given activity [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
In order to incorporate flexibility and adaptability into a business process design, and
benefit of the advantages of separation of two concerns: security and functional in
business process modeling, we propose, in this paper, a new rule based model that
wants to improving the flexibility, adaptability of business process.
      </p>
      <p>First, for the functional concern, we govern any business activity through our ECATE
formalism (Event-Condition-Action-Temporal condition- trigger Event) based on
business rules. Then, we integrate the security requirements in a separate concern as
EUCATE rules (a variant of ECATE rule).</p>
      <p>The rest of this paper is organized as follows. In the second section, we present rule
based business process modeling as set of ECATE rules. The third section explain
how to integrate flexibly the security requirement in the ECATE rules based process.
The section 4 gives a related works. Finally, wrapped up by some concluding remarks
and further required extensions of this work.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>A Rule based business process modeling</title>
      <sec id="sec-2-1">
        <title>Definition</title>
        <p>
          The process modeling aims to provide high-level specification independent from
implementation of such a specification. To support verification, validation, simulation of
the automated process, the process modeling language provides the appropriate syntax
and semantics to specify the precise requirements of business processes and reflect
the logic of the underlying process
As given in[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], two formalisms on which the most predominant process modeling
languages are developed, are graph-based formalism and rule based formalism.
Rule-based approach proposes to model the logic of the process with a set of business
rules. Each rule specifies properties of one or more business activity, such as the pre
and post conditions of execution. In comparison with graph based approaches, the
rule based approaches are more expressive and flexible [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. They are able to express
the temporal requirements. They take advantage in adaptation to ad hoc modification
at runtime and exception.
        </p>
        <p>
          Business rules are considered as policies, laws and know-how for doing business in
any cross-organizations. The ECA pattern has been widely adopted for business
rules[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. It is an interest way to incorporate flexibility into a process design. The
E-CA paradigm has been the foundation for many rule-based processes modeling
approaches. A survey of rule based approaches is given in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>To cope with flexibility, adaptability and temporal requirements of business process,
we propose an ECA based formalism ECATE to govern business rules as follows:
ON
IF
DO</p>
        <sec id="sec-2-1-1">
          <title>TIME</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>Trigger</title>
          <p>Event
Condition
Action
Constraint of execution Time</p>
          <p>Post Event
Its semantics is: for each concern (C) when the event (E) occurs, the activated rule
evaluates the condition(C). The condition is either a Boolean expression or a SQL
query on the database. If the condition is satisfied, the action (A) is executed. The
Time (T) is a condition on the execution time. It captures the constraints of time. This
condition is of type “before t”, “after t”, “during t” or a combination of three types.
before t means that the action A should be performed before the time t, “after t”
means that the action A should be performed after the time t. “during t” means that
the execution time of the action A should not exceed the time t. If the time constraint
is violated then the process will be interrupted and a compensating action will be
launched. The event triggered E design the set of events raised after the execution of
the action.
2.2</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Example</title>
        <p>
          In order to give an intuitive idea about our formalism, let us consider the following
scenario, inspired from [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Upon receipt of customer order, the calculation of the
initial price of the order and shipper selection is done simultaneously. When both
tasks are complete, a purchase order is sent to the costumer. In case of acceptance, a
bill is sent back to the customer. Finally, the bill is registered. A Functional
constraint exists in this scenario: the bill payments must be made 15 days before the
delivery date. The security constraints in this scenario are: 1) the client must be
authenticated in the company system to control purchases. 2) The client must be
authenticated in bank system to do banking. 3) If the amount of the bill exceeds some value m,
the client must have an authorization between 08h00 and 19h00 to pay bill. The figure
1 shows the modeling of the functional concern of this example.
        </p>
        <p>R1 R2 R4 R5</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>ON PBreogciness ON RMescgeive ON eSxeeleccutted ON ISPPCCeexxeeccuutteedd ON</title>
      <p>IF True IF True IF True IF True IF
TTDRIOMIGEGER ESR-exenqeudceuMstteeO:srsdaegre TTDIROMIGEGER EsSE-hexxileepecccpuutettreed: TTDRIOMIGEGER ESC-EPxxaeelcccuuulttaeet:de TTDIROMIGEGER E-EFCxxPaeelcccuuuttleed: DO</p>
      <p>R3</p>
      <p>R6</p>
      <p>R7</p>
      <p>TTIRMIGEGER E-FBCETePxrxixalueeelCcccceuuuultttaeeetd:de ITTDOFIRONMIGEGER -eETEBRPxrxCxeaeueeqyccceuuuuBetttseieeltd:d ITTDOFIRONMIGEGERR8ETERDePBrxxxPuaiueelerByccceinuuugttteee1:dd5D
ON Receive</p>
      <p>Msg
IF True
DO Execute:</p>
      <p>Calculate</p>
      <p>IP
TIME
TRIGGER Executed</p>
      <p>R9
ON PB</p>
      <p>executed
IF True
DO Execute:</p>
      <p>Save</p>
      <p>Bil
TIME</p>
      <p>TRIGGER Executed
This model represents the business process of the purchase order process as set of
ECATE Rules. So, The business rules are governed as ECATE rules. The event
“begin process” activates the business process. It represents customer order (it may
be, for example, clicking on the button "Place an order"). The two rules R2 (policy of
initial price calculation), R3 (policy of shipper selection) have the same event to be
activated. They represent two Parts of business process which will be executed in
parallel. The constraint " the bill payments must be made 15 days before the delivery
date " is specified in the time condition of the rule R8. The attribute time contains
the value "during 15D" which means that if the execution of the action pay bill exceed
15 day after the activating event "request pay bill executed", so the order will be
rejected, and a compensation action, to compensate the executed action part effects, will
Be launched. The successful execution of the rules R2 ,R3 actions will activate the
rule R4. In turn, the execution of this rule action actives another rules. And so on,
until the end of process rules set.</p>
      <p>So, the business process of the purchase order, in this example, is governed in a
flexible way as a set of ECATE rules. A flexibility way mean that we can implement
changes in some rules (parts of a business process) without affecting the rest of rules
(other parts).</p>
      <p>But, this ECATE rule based model take only the functional concern of the process.
3</p>
    </sec>
    <sec id="sec-4">
      <title>Flexible integration of security concern</title>
      <p>
        Separation of concerns provides a way to separate development of the functionality
and the crosscutting concerns (e.g., quality of service, security). This principle has
become one of the cornerstone principle in software engineering, and has lead to a
wide spread of aspect-oriented programming(AOP) approach [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The advantages in
addressing each concern separately are transparency, evolution, understandability and
scalability. More, it is necessary to bring them together to understand which global
system properties emerge at any given activity [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Some scientific research efforts
have interested to integrate the capture of security requirements in business process
modeling. A survey of these works is given in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. But, they haven't used an ECA
based formalism to capture the security requirement. Governing the business rules as
ECA rules with separation of concerns have many benefits including[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] (1) the
inherent ability of adapting any concern rules before imposing them on running services
or components; (2) the promotion of understandability of each concern in isolation
and then the study of the coherent composition.
      </p>
      <p>In order to integrate the security concern flexibly into a business process design, and
benefit of the advantages of separation of two concerns: functional and security in
business process modeling, we use, in this section, EUCATE rule, which is a variant
of ECATE, to govern the security requirement.</p>
      <p>Our formalism EUCATE is defined as fellow:
ON</p>
      <sec id="sec-4-1">
        <title>USER IF DO</title>
      </sec>
      <sec id="sec-4-2">
        <title>TIME</title>
      </sec>
      <sec id="sec-4-3">
        <title>Trigger</title>
        <p>Event
Activity User
Condition
Action
Constraint of execution Time</p>
        <p>Post Event
It have the same semantic of ECATE. The added attribute user specifies the activity
user. The figure 2 shows the integration of security requirements in the previous
model, using EUCATE rule in separate concern.</p>
        <p>R10
ITTDOFIRONMIGEGER RE-SRTB1eexrenqgueudcienueMsPttereO:osscradegseser ITTDUOFIROSNMEIGREGER -TEELCCRroxxueouceegmscecteinoiupuvmttCeeeeu:dMrsts.g</p>
        <p>R2</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>ON MRescgeive</title>
      <p>IF True
DO Execute:
Select
shipper
TIME
TRIGGER Executed</p>
      <p>R3
ON Receive Msg
IF True</p>
    </sec>
    <sec id="sec-6">
      <title>DO CExaelccuultaet:e IP</title>
      <p>TIME
TRIGGER Executed</p>
      <p>R11
ON RPB executed
USER Customer
IF True
DO Execute:
CustBanklogi
TIME RejectOrder
TRIGGER Executed
R4</p>
    </sec>
    <sec id="sec-7">
      <title>ON eSxeeleccutted</title>
      <p>IF True</p>
    </sec>
    <sec id="sec-8">
      <title>DO ECxaelccuultaet:e SP</title>
      <p>TIME
TRIGGER Executed
ITTDOFIRONMIGEGER R-EEBTRB7rxxiCelueeqcceeuuuxeettseect:duPtaeyd ITTDOFIRONMIGEGER REReTEDP8xrxxPuaeueerByccceiunuuBtgtteieeld1:d5D
R12
ON CustBanklogin executed</p>
    </sec>
    <sec id="sec-9">
      <title>USER CAcucsotoumnteMr,anager</title>
      <p>IF Bill&gt;M
DO Execute:</p>
      <p>Custhankautorization()
TIME After 08h00, before 19h00
TRIGGER Executed</p>
      <p>R9
ON PB executed
IF True
DO Execute:Save Bil
TIME</p>
      <p>TRIGGER Executed
The security requirements are modeled separately as set of EUCATE Rules. The
separation of concerns promotes the understandability of each concern in isolation. For
example, The rules R10, R11, R12 are of security concern that govern a security
constraints. These rules may be modeled and handled by a security expert designer,
independently of other concerns. The three rules R10 (policy of Company customer login)
R2 (policy of initial price calculation), R3 (policy of shipper selection) have the same
event to be activated. It is “begin process” event that represents customer order (it
may be, for example, clicking on the button "Place an order"). However, they can't be
activated at the same time, because they are of two different concerns. To avoid
conflict between concerns, the security concern has more priority. In result, the rule R10
is activated before the rules R2 and R3. More, the rules R2 and R3 can not be
activated if the R10 is not activated successfully. In other words, the condition and the time
condition of R10 must be satisfied. If not, the order will be rejected. So, it will be
useless to activate the rules R2 and R3. In a positive case, R2 and R3 will be activated
in the same time, because they are of the same concern. In turn, the execution of
these rules actions actives another rules. And so on, until the end of process rules set.
So, the business process of the purchase order is governed now in a flexible way as a
set of rules divided on two concerns: security concern and functional concern. A
flexibility way mean that we can implement changes in some rules (parts of a business
process) without affecting the rest of rules (other parts).
4</p>
    </sec>
    <sec id="sec-10">
      <title>Verification of rules based process</title>
      <p>
        It is important that a process model is correctly defined, analyzed, refined and verified
before being deployed in the runtime environment[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>The exceptions healing of the business process means that detecting the functional
errors on the process and the risks on changing rules. These risks may be exceptions
raised at run time like infinite loop and process non-termination, services deny.</p>
      <p>The verify of functioning of the business process by analyzing the graph of rules
based process is not scope of this paper . We are interested here by the formal
verification of the rules based process. Our verification consists of two steps : the
transformation of ECATE/EUCATE rules into a Petri net, and verification of such Petri net
The steps of such verification are summarized in the following diagram:
ECA rules
Textual
oWFN</p>
      <p>Input / Output</p>
      <p>computing
Rules combining</p>
      <p>ECA to PetriNet
Vérification of</p>
      <p>Petri net</p>
      <p>The oWFN (open WorkFlow) is a kind of Petri nets in order to verify the
controllability property. The transformation of ECA rules to Petri Net allows to verify rules
based business process and to exploit technical verification of Petri nets in the
framework of business processes.</p>
      <p>The transformation steps are as follows:</p>
      <p>Structuring the used ECA rules
In our case, the used rules must simples: the two sides must contain only one
variable, in order to have reducing during the following steps. The complex
rules can be represented by simple sub-rules.</p>
      <p>Research inputs and outputs
The input are variables with non beginning and not having predecessors,The
outputs are variables non final and have no successors.</p>
      <p>Combining rules
This step consist to reduce simple rules number applying the following
principles:
Each left side of the rule must contain one input variable and one variable or
one input and several variables.</p>
      <p>Each right side of the rule must contain one output and one variable or one
output and several variables.</p>
      <p>A rule doesn't contain an input and output in the same time. All the rules must
respect the previous principles and are able te be combined.</p>
      <p>Rules from ECA to Petri Net
Each rule becomes transition. The event and action becomes places.</p>
      <p>
        Verification of Petri net
We verify the properties of Deadlock, Live lock, Boundness and
controllability on the produced Petri net using tools of Petri net verification as Lola[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
and Fiona[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The detail of the verification is not given in this paper.
5
      </p>
    </sec>
    <sec id="sec-11">
      <title>Related work</title>
      <p>
        The authors in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] believe that it is important to couple WS-BPEL with a model for
expressing authorization policies and constraints, and a mechanism to enforce them.
They see that it is important that such an authorization model be high-level and
expressed in terms of entities that are relevant from the organizational perspective.
They propose an extension of WS-BPEL syntax with an authorization model that also
supports the specification of a large number of different types of constraints. But,
BPEL is not flexible.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] propose a flexible access control policies through the use of three classes of
restraint rules in active cooperation: authorization rules, assignment rules and
activation rules. A restraint rule consists of prerequisite conditions and a consequence. Each
condition is in form of one or more weighted atomic conditions combined through
logic operation connectors.
      </p>
      <p>
        To enable a dynamic business process management, the authorization policies in
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] are expressed in an SQL-like language which can be rewritten into query
sentences for execution. The framework proposed supports dynamic integration and
execution of multiple access control polices from disparate enterprise resources.
      </p>
      <p>
        In order to support the authorization policy development, [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] introduce a simple
and readable authorization rules language implemented in a Ruby on Rails [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]
authorization plug-in that is employed in workflow application. Ruby on Rails is a Web
development framework that supports agile development and draws from the
metaprogramming features of the programming language Ruby.
      </p>
      <p>
        Authors in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] propose active role-based access control model to assign
permissions to users in real time and automatically. They combine the role-based access
control model with the active database. They exploit the characteristics of the active
database to assign roles to users based on the event trigger, user and environmental
conditions, and to assign permissions to roles using the RBAC model.
6
      </p>
    </sec>
    <sec id="sec-12">
      <title>Conclusions and future work</title>
      <p>In this paper, we present a flexible integration of security concern in a rules based
business process modeling. We are proposed a new ECA based rules to govern the
functional and security business rules in multi-concerns view. The approach is
thoroughly illustrated using an order purchase example.</p>
      <p>How to manage this flexibility? What are the relationships between the rules of
different concerns? How to recognize and heal the functional exceptions in rules based
process? How to verify this rules based business process? Some answers for these
questions will be subjects of future works.
7</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Jakoubi</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tjoa</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goluch</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quirchmayr</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management</article-title>
          ,
          <source>in DEXA '09 Proceedings of the 20th International Workshop on Database and Expert Systems Application</source>
          , IEEE Computer Society Washington, DC, USA ©
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Rodríguez</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernández-Medina</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piattini</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <article-title>Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes</article-title>
          ,
          <source>In: Proceedings of Trust and Privacy in Digital Business (TrustBus</source>
          <year>2006</year>
          ), Springer,
          <year>2006</year>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Papazoglou</surname>
            <given-names>M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Traverso</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dustdar</surname>
            <given-names>S.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Leymann</surname>
            <given-names>F</given-names>
          </string-name>
          ,
          <article-title>Service-Oriented Computing: a Research Roadmap</article-title>
          .
          <source>Int. J. Cooperativ Inf. Syst.</source>
          ,
          <volume>17</volume>
          (
          <issue>2</issue>
          ):
          <fpage>223</fpage>
          -
          <lpage>255</lpage>
          ,
          <year>2008</year>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bertino</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crampton</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paci</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Access</given-names>
            <surname>Control</surname>
          </string-name>
          and
          <article-title>Authorization Constraints for WSBPEL, icws</article-title>
          , pp.
          <fpage>275</fpage>
          -
          <lpage>284</lpage>
          , IEEE International Conference on Web
          <source>Services (ICWS'06)</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Business Rules Group.
          <source>Defining Business Rules - What Are They Really? www.businessrulesgroup.org</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Wan-Kadir W.M.N</surname>
          </string-name>
          . and
          <string-name>
            <surname>Loucopoulos</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <article-title>Relating Evolving Business Rules to Software Design</article-title>
          .
          <source>Journal of Systems Architecture</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Ahn G.-J.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kang</surname>
            <given-names>M.</given-names>
          </string-name>
          , and Park J., ,
          <string-name>
            <surname>Injecting</surname>
            <given-names>RBAC</given-names>
          </string-name>
          <article-title>to secure a web-based workflow system</article-title>
          .
          <source>In Proceedings of the 5th ACM Workshop on Role-Based Access Control</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kazhamiakin</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benbernou</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baresi</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plebani</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uhlig</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Barai</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <source>Adaptation of Service-Based Systems Service Research Challenges and Solutions for the Future Internet, Lecture Notes in Computer Science</source>
          , Springer-Verlag,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Aoumeur</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barkaoui</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saake</surname>
            <given-names>G.</given-names>
          </string-name>
          , ,
          <article-title>A multi-dimensional architectural approach to behavior-intensive adaptive pervasive applications</article-title>
          ,
          <source>in ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing</source>
          , IEEE Press Piscataway, NJ, USA.
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Ruopeng</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadiq</surname>
            <given-names>S.,</given-names>
          </string-name>
          <article-title>a Survey of Comparative Business Process Modeling Approaches</article-title>
          ,
          <source>in BIS'07 Proceedings of the 10th international conference on Business information systems</source>
          Springer-Verlag Berlin, Heidelberg ©
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Boukhebouze</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amghar</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benharkat</surname>
            <given-names>A.</given-names>
          </string-name>
          , Maamar
          <string-name>
            <surname>Z.</surname>
          </string-name>
          ,
          <article-title>Rule-based Approach to Model and Verify Flexible Business Processes</article-title>
          ,
          <source>International Journal of Business Process Integration and Management: IJBPIM</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Massuthe</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weinberg</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fiona</surname>
          </string-name>
          : A Tool to Analyze Interacting Open Nets.
          <source>AWPN</source>
          <year>2008</year>
          :
          <fpage>99</fpage>
          -
          <lpage>104</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Schmidt</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>LoLA: A Low Level</surname>
            <given-names>Analyser</given-names>
          </string-name>
          ,
          <source>Application and Theory of Petri Nets</source>
          <year>2000</year>
          : 21st International Conference, ICATPN 2000, Aarhus, Denmark,
          <year>June 2000</year>
          . Proceedings, volume
          <volume>1825</volume>
          <source>of Lecture Notes in Computer Science</source>
          , pages
          <fpage>465</fpage>
          -
          <lpage>474</lpage>
          ,
          <year>June 2000</year>
          . SpringerVerlag
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Yuqing</surname>
            <given-names>Sun</given-names>
          </string-name>
          , Bin Gong , Xiangxu Meng , Zongkai Lin ,
          <string-name>
            <surname>Bertino E.</surname>
          </string-name>
          , ,
          <article-title>Specification and enforcement of flexible security policy for active cooperation</article-title>
          ,
          <source>Information Sciences: an International Journal, July</source>
          , v.
          <volume>179</volume>
          n.15, p.
          <fpage>2629</fpage>
          -
          <lpage>2642</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Cao</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Minglu</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>A policy-based authorization model for workflowenabled dynamic process management</article-title>
          ,
          <source>Journal of Network and Computer Applications</source>
          , March, v.
          <volume>32</volume>
          n.2, p.
          <fpage>412</fpage>
          -
          <lpage>422</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Bartsch</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sohr</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bormann</surname>
            <given-names>C.</given-names>
          </string-name>
          , ,
          <article-title>Supporting Agile Development of Authorization Rules for SME Applications, Collaborative Computing: Networking, Applications</article-title>
          and Worksharing, 4th International Conference,
          <source>CollaborateCom November 13-16</source>
          , Orlando, FL, USA,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>17. Ruby on rails, website: http://rubyonrails.org/</mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Mei-Yu</surname>
            <given-names>Wu</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chih-Kun</surname>
            <given-names>Ke</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jung-Shin</surname>
            <given-names>Liu</given-names>
          </string-name>
          ,
          <article-title>"Active Role-based Access Control Model with Event-Condition-Action Rule and Case-Based Reasoning"</article-title>
          ,
          <source>JCIT: Journal of Convergence Information Technology</source>
          , Vol.
          <volume>6</volume>
          , No.
          <issue>4</issue>
          , pp.
          <fpage>328</fpage>
          -
          <lpage>339</lpage>
          ,
          <year>2011</year>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>