Towards BPEL in the Cloud: Exploiting Different Delivery Models for the Execution of Business Processes
- 1 July 2009
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
More and more companies are outsourcing parts of their business processes to third party providers to exploit the expertise and economies of scale of these third party providers. In the IT field, emerging delivery models for software such as Software as a Service and cloud computing offer the possibility to outsource applications and computing infrastructure and thus enable enterprises to focus on their core competences. In this paper we investigate how the new delivery models affect the outsourcing of business processes modeled in WS-BPEL. WS-BPEL is the standard to model and execute business processes in Web service-based IT landscapes. We describe how security and trust issues affect the execution of BPEL processes in the cloud and show the requirements on the middleware supporting the execution of BPEL processes.Keywords
This publication has 14 references indexed in Scilit:
- VxBPEL: Supporting variability for Web services in BPELInformation and Software Technology, 2009
- Generation of BPEL Customization Processes for SaaS Applications from Variability DescriptorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- From RosettaNet PIPs to BPEL processes: A three level approach for business protocolsData & Knowledge Engineering, 2007
- On the Syntax of Reference Model Configuration – Transforming the C-EPC into Lawful EPC ModelsPublished by Springer Nature ,2006
- E Role-based Decomposition of Business Processes using BPELPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Workflow mining: discovering process models from event logsIEEE Transactions on Knowledge and Data Engineering, 2004
- Web services QoS: external SLAs and internal policies or: how do we deliver what we promise?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- The role of cryptography in database securityPublished by Association for Computing Machinery (ACM) ,2004
- Workflow mining: A survey of issues and approachesData & Knowledge Engineering, 2003
- Practical server privacy with secure coprocessorsIBM Systems Journal, 2001