Runtime Verification of Business Processes

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

Systems Analysis, Prototyping and Iteration Systems Analysis.
A brief look at CORBA. What is CORBA Common Object Request Broker Architecture developed by OMG Combine benefits of OO and distributed computing Distributed.
SwE 434. Rational Quality Manager Rational Quality Manager is a collaborative, Web-based tool that offers comprehensive test planning, test construction,
Self Adaptive Software
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Decentralized Information Spaces for Composition and Unification of Services (DISCUS)  Successor to OzWeb  Builds on WebServices  (Relatively) Static.
 QUALITY ASSURANCE:  QA is defined as a procedure or set of procedures intended to ensure that a product or service under development (before work is.
Hazard Analysis and Critical Control Points
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Bottom-Up Integration Testing After unit testing of individual components the components are combined together into a system. Bottom-Up Integration: each.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Introduction to Software Quality Assurance (SQA)
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 The Analysis Phase System Requirements Models and Modelling of requirements Stakeholders as a source of requirements.
Control in ATLAS TDAQ Dietrich Liko on behalf of the ATLAS TDAQ Group.
Refining middleware functions for verification purpose Jérôme Hugues Laurent Pautet Fabrice Kordon
Information Security What is Information Security?
Quality of System requirements 1 Performance The performance of a Web service and therefore Solution 2 involves the speed that a request can be processed.
SWAMI 1 SUPER WORM ANALYSIS MECHANISM Prof. Jerry Breecher.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
CMSC 345 Fall 2000 Requirements Overview. Work with customers to elicit requirements by asking questions, demonstrating similar systems, developing prototypes,
IAD 2263: System Analysis and Design Chapter 3: Investigating System Requirements.
© 2013 IBM Corporation IBM Tivoli Composite Application Manager for Transactions Transaction Tracking Best Practice for Workspace Navigation.
Security Patterns Template and Tutorial - Darrell M. Kienzle, Ph.D., Matthew C. Elder, Ph.D., David S. Tyree, James Edwards-Hewitt Presented by Dan Frohlich.
Network design Topic 6 Testing and documentation.
Click to add text Systems Analysis, Prototyping and Iteration.
United Nations Oslo City Group on Energy Statistics OG7, Helsinki, Finland October 2012 ESCM Chapter 8: Data Quality and Meta Data 1.
Jemerson Pedernal IT 2.1 FUNDAMENTALS OF DATABASE APPLICATIONS by PEDERNAL, JEMERSON G. [BS-Computer Science] Palawan State University Computer Network.
Design and implementation Chapter 7 – Lecture 1. Design and implementation Software design and implementation is the stage in the software engineering.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
4 Chapter 4: Beginning the Analysis: Investigating System Requirements Systems Analysis and Design in a Changing World, 3 rd Edition.
Chapter 5 – System Modeling
ITEC 275 Computer Networks – Switching, Routing, and WANs
Managing, Storing, and Executing DTS Packages
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
2012 Spring Simulation Interoperability Workshop
Chapter 11 Designing Inputs, Outputs, and Controls.
Chapter 5 – System Modeling
Software Verification and Validation
Network Life Cycle Created by Michael Law
Unified Modeling Language
Runtime Verification of Business Processes
Event Studio Cognos 8 BI.
System Modeling Chapter 4
Enterprise Integration: Workflow
Lecture Software Process Definition and Management Chapter 3: Descriptive Process Models Dr. Jürgen Münch Fall
Enterprise Service Bus (ESB) (Chapter 9)
SDLC Model A framework that describes the activities performed at each stage of a software development project.
Lecture 09:Software Testing
CLINICAL INFORMATION SYSTEM
IS4680 Security Auditing for Compliance
QGen and TQL-1 Qualification
Patterns.
Analysis models and design models
An Introduction to Software Architecture
Software Verification, Validation, and Acceptance Testing
Capability Maturity Model
Chapter 29: Program Security
Engineering Quality Software
Security in SDR & cognitive radio
Capability Maturity Model
Chapter 4 System Modeling.
From Use Cases to Implementation
Presentation transcript:

Runtime Verification of Business Processes Jānis Bičevskis, University of Latvia VPP-2.posms, 2016, Riga

Security Information security is defined within the standard in the context of the C-I-A triad: the preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods) availability (ensuring that authorized users have access to information and associated assets when required). ISO/IEC 27002 provides best practice recommendations on information security management.

Processes define activity proceses staff systems Man liekas, ka šo varētu izmest VPP-2.posms, 2016, Riga

Initial question Does business process runs correctly? Process can run over more than one IS Environment is changing May be process instance is late? Some processes only partly are supported by IS VPP-2.posms, 2016, Riga

Quality assurance Static analysis – software is verified without execution Dynamic analysis – software verification using test examples in the testing environment Runtime verification – software is verified continuously during runtime in the live environment VPP-2.posms, 2016, Riga

Main objectives Provide verification for processes without built-in verification mechanism Provide verification for processes running in heterogeneous environment Provide early warning and error messaging system Provide easy and dynamic definition of process verification descriptions VPP-2.posms, 2016, Riga

VPP-2.posms, 2016, Riga

Related implementations Hardware and software monitoring Widely used in embedded systems: automotive industrial machinery Document management and workflow systems – monitoring SOA proxy – verifies request, responses, execution patterns and timing VPP-2.posms, 2016, Riga

Problems Built-in solutions Implemented for one system or one platform SOA proxy – only for webservices and intervening with execution VPP-2.posms, 2016, Riga

Correctness criteria Process is executed by legal execution path Required actions are executed Execution time limits are not violated VPP-2.posms, 2016, Riga

Proposed solution Verification process is designed for each base process Controller verifies process execution using process verification description Process execution events are detected by agents VPP-2.posms, 2016, Riga

Base process -> verification process VPP-2.posms, 2016, Riga

Proposed solution Verification process is designed for each base process Controller verifies process execution using process verification description Process execution events are detected by agents VPP-2.posms, 2016, Riga

Verification mechanism controller <-> agents VPP-2.posms, 2016, Riga

Process verification description language Base element – event describing activity: type parameters agent & address timing (fixed time or relative) Event order Events may have «subevents» Variables are used to link events VPP-2.posms, 2016, Riga

Lessons learned by prototyping Rather detailed base process execution model must be available Agent delays and some peculiarities should be taken into account Agents must be developed with minimum overhead for runtime environment: event-based recomended VPP-2.posms, 2016, Riga

Performance issues Agents identified all of requested evetns Errors were caused by the controller workload – event request reached agent after event occured Event detection could be requested more than one step ahead VPP-2.posms, 2016, Riga

Summary Solution is applicable for heterogeneous environment No changes are required in running systems Set of agents may be supplements without any changes in controller or verification process descriptions Solution is applicable for wide area of problems: high level business processes document processing systems time critical data processing systems VPP-2.posms, 2016, Riga

Thank you for attention! Questions? VPP-2.posms, 2016, Riga