Skip to main content

Testing Policy-Based e-Health Monitoring Processes Using TTCN-3

  • Conference paper
  • First Online:
E-Technologies (MCETECH 2015)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 209))

Included in the following conference series:

  • 888 Accesses

Abstract

e-Health processes are data-focused, event-driven, and dynamic. They should be systematically monitored for compliance with legislation, organizational guidelines, and quality of care protocols. Monitoring BPEL-defined online processes in a Service Oriented Architecture (SOA) is complex, especially since healthcare processes often involve the collaboration of different organizations. We extend the traditional SOA framework with policy-based processing of streaming event data using a general publish/subscribe model in a business-to-business (B2B) healthcare network. The testing of such systems is difficult to manage and difficult to implement using general purpose languages because of intensive interleaved behaviors. We propose several TTCN-3 solutions to the interleave problem both at the level of actors behavior and at the level of the end-to-end behavior of the process. Finally, we discuss how TTCN-3 can be used at the design stage to simulate the behavior of actors by an abstract test component behavior emulation in parallel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eze, B., Kuziemsky, C., Peyton, L., Middleton, G., Mouttham, A.: A Framework for Continuous Compliance Monitoring of eHealth Processes. Journal of Theoretical and Applied Electronic Commerce Research 5(1), 56–70 (2010)

    Google Scholar 

  2. OASIS eXtensible Access Control Markup Language (XACML). http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf

  3. Foster, I., Kesselman, C., Nick, J., Tuecke, S.: Grid services for distributed system integration. Computer 35(6), 37–46 (2002)

    Article  Google Scholar 

  4. Huhns, M.N., Singh, M.P.: Service-oriented computing: Key concepts and principles. IEEE Internet Computing 9(1), 75–81 (2005)

    Google Scholar 

  5. Doshi, C., Peyton, L.: Trusted information process in B2B networks. In: Proceedings of the 10th International Conference on Enterprise Information Systems, Barcelona, Spain (2008)

    Google Scholar 

  6. OASIS Standard, Web services business process execution language version 2.0. (April 2007). http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html

  7. Niblett, P., Graham, S.: Events and service-oriented architecture: The OASIS web services notification specifications. IBM Systems Journal 44(4) (2005)

    Google Scholar 

  8. Etzion, O., Chandy, M., Ammon, R.V., Schulte, R.: Event-driven architectures and complex event processing. In: IEEE International Conference on Services Computing, Chicago, p. 30 (2006)

    Google Scholar 

  9. Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.: The many faces of publish/subscribe. ACM Computing Surveys 35(2), 114–131 (2003)

    Article  Google Scholar 

  10. Peyton, L., Hu, J., Doshi, C., Seguin, P.: Addressing privacy in a federated identity management network for e-health. In: 8th World Congress on the Management of eBusiness, Toronto (2007); Internet Computing 9(1), 75–81 (2005)

    Google Scholar 

  11. Harrocks, I., Angele, J., Decker, S., Kifer, M., Grosof, B., Wagner, G.: What are the rules? IEEE Intelligent Systems 18(5), 76–83 (2003)

    Article  Google Scholar 

  12. Bailey, J., Poulovassilis, A., Wood, P.: An event-condition-action language for XML. In: Proceedings of the 11th International Conference on World Wide Web, Honolulu, Hawaii, USA, pp. 486–495 (2002)

    Google Scholar 

  13. Barth, A., Datta, A., Mitchell, J., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: IEEE Symposium on Security and Privacy, pp. 184–198 (2006)

    Google Scholar 

  14. Vega, D.E., Din, G., Schieferdecker, I.: Application of TTCN-3 Test Language to Testing Information System in e-Health Domain. In: Multimedia and Information Technology (MCIT), pp. 21–24 (2010)

    Google Scholar 

  15. Vega, D.E.: Towards an Automated and Dynamically Adaptable Test System for Testing Healthcare Information Systems. In: 2010 Third International Conference on Software Testing, Verification and Validation (2010)

    Google Scholar 

  16. Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Miller, R., Scarfone, K.: Guide to attribute based access control (ABAC) definition and considerations. In: NIST Special Publication 800-162 (January 2014). http://nvlpubs.nist.gov/nistpubs/-specialpublications/NIST.sp.800-162.pdf

  17. Stepien, B., Felty, A., Matwin, S.: Strategies for Reducing Risks of Inconsistencies in Access Control Policies. In: ARES 2010 Proceedings (2010)

    Google Scholar 

  18. Stepien, B., Felty, A., Matwin, S.: A Non-technical User-Oriented Display Notation for XACML Conditions. In: Babin, G., Kropf, P., Weiss, M. (eds.) E-Technologies: Innovation in an Open World. LNBIP, vol. 26, pp. 53–64. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  19. Stepien, B., Felty, A., Matwin, S.: A non-technical XACML target editor for dynamic access control systems. In: SECOTS 2014 Proceedings, pp. 150–157

    Google Scholar 

  20. Li, N., Hwang, J., Xie, T.: Multiple Implementation Testing for XACML Implementations. In: ACM 2008 (2008)

    Google Scholar 

  21. OASIS-XACML 3.0 schema. http://docs.oasis-open.org/xacml/3.0/XSD/xacml-core-v3-schema-cd-1.xsd

  22. Stepien, B., Felty, A., Matwin, S.: Challenges of Composing XACML Policies. In: ARES 2014 Proceedings, pp. 234–241 (2014)

    Google Scholar 

  23. Stepien, B., Seguin, P., Peyton, L.: Integration Testing of Composite Applications. In: HICSS 41st Proceedings

    Google Scholar 

  24. Testing Technologies, TTworkbench an eclipse based TTCN-3 IDE. www.testingtech.com

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bernard Stepien .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Stepien, B., Eze, B., Peyton, L. (2015). Testing Policy-Based e-Health Monitoring Processes Using TTCN-3. In: Benyoucef, M., Weiss, M., Mili, H. (eds) E-Technologies. MCETECH 2015. Lecture Notes in Business Information Processing, vol 209. Springer, Cham. https://doi.org/10.1007/978-3-319-17957-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17957-5_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17956-8

  • Online ISBN: 978-3-319-17957-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics