2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.60
|View full text |Cite
|
Sign up to set email alerts
|

Automated Synthesis and Ranking of Secure BPMN Orchestrators

Abstract: We describe a formal methodology for the automatic synthesis of a secure orchestrator for a set of BPMN processes. The synthesized orchestrator is able to guarantee that all the processes that are started reach their end, and the resulting orchestrator process is secure, that is, it does not allow discloure of certain secret messages.In this work we present an implementation of a forth and back translation from BPMN to crypto-CCS, in such a way to exploit the PaMoChSA tool for synthesizing orchestrators.Furthe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…The authors use several specific constructs to express usual security requirements for services (derived from a number of Web service security standards, like WS‐Security), check the process for possible violations and have the main focus on adaptation of the orchestration in order to avoid violation of contract terms. Ciancia et al extended the work with a richer specification language (CryptoCCS) and provided transformation from BPMN to this language. Instead, in our paper, we focus on monitoring of security properties, define how and where monitoring actions must be performed, and trigger the notification mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…The authors use several specific constructs to express usual security requirements for services (derived from a number of Web service security standards, like WS‐Security), check the process for possible violations and have the main focus on adaptation of the orchestration in order to avoid violation of contract terms. Ciancia et al extended the work with a richer specification language (CryptoCCS) and provided transformation from BPMN to this language. Instead, in our paper, we focus on monitoring of security properties, define how and where monitoring actions must be performed, and trigger the notification mechanism.…”
Section: Related Workmentioning
confidence: 99%