{"id":64,"date":"2014-02-21T08:22:43","date_gmt":"2014-02-21T07:22:43","guid":{"rendered":"http:\/\/lig-membres.imag.fr\/chollet\/?p=64"},"modified":"2025-02-10T10:54:03","modified_gmt":"2025-02-10T09:54:03","slug":"orchestration","status":"publish","type":"post","link":"https:\/\/lig-membres.imag.fr\/chollet\/2014\/02\/21\/orchestration\/","title":{"rendered":"Orchestration of heterogeneous and secured services"},"content":{"rendered":"<p><!--:fr--><\/p>\n<p style=\"text-align: justify;\">L&#8217;approche \u00e0 services est apparue en ayant pour but de construire des applications \u00e0 partir d&#8217;entit\u00e9s logicielles, nomm\u00e9es services. Un service fournit un ensemble de fonctionnalit\u00e9s d\u00e9finies par une description de services. A partir de cette description, un consommateur de service peut rechercher un service qui corresponde \u00e0 ses besoins, le s\u00e9lectionner et l&#8217;invoquer. La construction d&#8217;applications par composition de services demeure n\u00e9anmoins une activit\u00e9 complexe puisqu&#8217;il faut traiter conjointement les aspects m\u00e9tier et techniques ; la composition doit satisfaire aux exigences fonctionnelles et non-fonctionnelles ainsi que respecter les contraintes des technologies \u00e0 services li\u00e9es, notamment, \u00e0 l&#8217;h\u00e9t\u00e9rog\u00e9n\u00e9it\u00e9 des plates-formes. Par ailleurs, les points forts de l&#8217;architecture \u00e0 services, qui sont la distribution et le d\u00e9ploiement des services sur des plates-formes h\u00e9t\u00e9rog\u00e8nes, ouvrent d\u2019importantes failles de s\u00e9curit\u00e9.<\/p>\n<p style=\"text-align: justify;\">Nos travaux sont bas\u00e9s sur une approche dirig\u00e9e par les mod\u00e8les pour simplifier la r\u00e9alisation d&#8217;applications bas\u00e9es sur une orchestration de services h\u00e9t\u00e9rog\u00e8nes en prenant en consid\u00e9ration les aspects de s\u00e9curit\u00e9 d\u00e8s l&#8217;\u00e9tape de conception. Pour cela, nous avons d\u00e9fini deux m\u00e9ta-mod\u00e8les : l&#8217;un pour l&#8217;orchestration de services et l&#8217;autre pour la s\u00e9curit\u00e9, ainsi que des liens entre ces m\u00e9ta-mod\u00e8les dans le but d\u2019\u00e9tendre l&#8217;orchestration avec des propri\u00e9t\u00e9s de s\u00e9curit\u00e9. Ainsi, il est possible de r\u00e9aliser des mod\u00e8les d&#8217;orchestration de services h\u00e9t\u00e9rog\u00e8nes et s\u00e9curis\u00e9s conformes aux m\u00e9ta-mod\u00e8les. A partir de ces mod\u00e8les, nous g\u00e9n\u00e9rons le code n\u00e9cessaire \u00e0 l&#8217;ex\u00e9cution de l&#8217;orchestration. L&#8217;ex\u00e9cution se fait en fonction des mod\u00e8les d\u00e9finis dans la phase de conception et des services disponibles qui r\u00e9pondent aux sp\u00e9cifications.<\/p>\n<p style=\"text-align: justify;\"><b>Mots-cl\u00e9s :<\/b> Approche \u00e0 services, Composition de services, S\u00e9curit\u00e9, Approche g\u00e9n\u00e9rative.<\/p>\n<p><b>Publications associ\u00e9es<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"text-decoration: underline;\">St\u00e9phanie\u00a0Chollet<\/span>, Philippe\u00a0Lalanda. <b>An Extensible Abstract Service Orchestration Framework.<\/b> In <i>Proceedings of the 2009 IEEE International Conference on Web Services (ICWS 2009)<\/i>, p. 831-838, July 6-10, 2009, Los Angeles, CA, USA, IEEE Computer Society.<\/li>\n<li><span style=\"text-decoration: underline;\">St\u00e9phanie\u00a0Chollet<\/span>, Philippe\u00a0Lalanda. <b>Security Specification at Process Level.<\/b> In <i>Proceedings of the 2008 IEEE International Conference on Services Computing \u2013 Volume 1 (SCC 2008)<\/i>, p. 165-172, July 8-11, 2008, Honolulu, HI, USA, IEEE Computer Society.<\/li>\n<\/ul>\n<p><!--:--><!--:en--><\/p>\n<p style=\"text-align: justify;\">Service-oriented Computing (SOC) has appeared recently as a new software engineering paradigm. The very purpose of this reuse-based approach is to build applications through the late composition of independent software elements, called services, which are made available at run-time by internal or external providers. SOC brings properties of major interest. First, it supports rapid application development. Using existing, already tested, services is likely to reduce the time needed to build up an application and the overall quality of this application. SOC also improves software flexibility through late binding. A service to be used by an application is chosen at the last moment, based on its actual availability and on its properties at that moment.<\/p>\n<p style=\"text-align: justify;\">The service orientation has also to face thorny problems, as in any reuse-based approach. In this work, we focus on two major issues: the integration of heterogeneous service-oriented technologies and the management of security aspects when invoking a service. Security is actually a major concern to SOC practitioners. SOC technologies have allowed companies to expose applications, internally and externally, and, for that reason are heavily used. However, in some distributed environments, software services and process engines can be alarmingly vulnerable. Service-based processes can expose organizations to a considerable amount of security risk and dependability degradation.<\/p>\n<p style=\"text-align: justify;\">We propose to use a model-driven approach for solving this problem. During system design, paradigms such as abstraction, separation of concerns and language definition are used to define a model of the service composition with security properties. This model is transformed into an execution model. We present a generative environment applying these principles for service composition.<\/p>\n<p style=\"text-align: justify;\"><b>Keywords:<\/b> Service-oriented approach, service composition, security, generative approach.<\/p>\n<p><b>Related work<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"text-decoration: underline;\">St\u00e9phanie\u00a0Chollet<\/span>, Philippe\u00a0Lalanda. <b>An Extensible Abstract Service Orchestration Framework.<\/b> In <i>Proceedings of the 2009 IEEE International Conference on Web Services (ICWS 2009)<\/i>, p. 831-838, July 6-10, 2009, Los Angeles, CA, USA, IEEE Computer Society.<\/li>\n<li><span style=\"text-decoration: underline;\">St\u00e9phanie\u00a0Chollet<\/span>, Philippe\u00a0Lalanda. <b>Security Specification at Process Level.<\/b> In <i>Proceedings of the 2008 IEEE International Conference on Services Computing \u2013 Volume 1 (SCC 2008)<\/i>, p. 165-172, July 8-11, 2008, Honolulu, HI, USA, IEEE Computer Society.<\/li>\n<\/ul>\n<p><!--:--><\/p>\n<div id=\"ir-ext-ui\" style=\"color: #000000; font-size: 16px; line-height: 16px; background-color: #f7f7f7; border: 1px solid #999999; border-radius: 1px; top: 1px; left: 1px;\">\n<div class=\"ir-ext-dimensions\"><span class=\"ir-ext-rendered\" title=\"Rendered image dimensions (after any scaling\/resizing has been applied)\"> x <\/span> <span class=\"ir-ext-natural\" title=\"Natural image dimensions (without applying any scaling\/resizing)\"> (x) <\/span><\/div>\n<div class=\"ir-ext-filesize\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>L&#8217;approche \u00e0 services est apparue en ayant pour but de construire des applications \u00e0 partir d&#8217;entit\u00e9s logicielles, nomm\u00e9es services. Un service fournit un ensemble de fonctionnalit\u00e9s d\u00e9finies par une description de services. A partir de cette description, un consommateur de &hellip; <a href=\"https:\/\/lig-membres.imag.fr\/chollet\/2014\/02\/21\/orchestration\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":105,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-64","post","type-post","status-publish","format-standard","hentry","category-themes"],"_links":{"self":[{"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/posts\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":12,"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":134,"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/posts\/64\/revisions\/134"}],"wp:attachment":[{"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lig-membres.imag.fr\/chollet\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}