2014
DOI: 10.4018/ijsse.2014040103
|View full text |Cite
|
Sign up to set email alerts
|

Automated Synthesis and Ranking of Secure BPMN Orchestrators

Abstract: The authors describe a formal methodology for the automatic synthesis of a secure orchestrator for a set of BPMN processes. The synthesized orchestrator is able to guarantee that all the processes that are started reach their end, and the resulting orchestrator process is secure, that is, it does not allow the disclosure of certain secret messages. The authors present an implementation of a forth and back translation from BPMN to Crypto-CCS, that permits them to exploit the previously existing PaMoChSA tool to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…The authors use several specific constructs to express usual security requirements for services (derived from a number of Web service security standards, like WS‐Security), check the process for possible violations and have the main focus on adaptation of the orchestration in order to avoid violation of contract terms. Ciancia et al extended the work with a richer specification language (CryptoCCS) and provided transformation from BPMN to this language. Instead, in our paper, we focus on monitoring of security properties, define how and where monitoring actions must be performed, and trigger the notification mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…The authors use several specific constructs to express usual security requirements for services (derived from a number of Web service security standards, like WS‐Security), check the process for possible violations and have the main focus on adaptation of the orchestration in order to avoid violation of contract terms. Ciancia et al extended the work with a richer specification language (CryptoCCS) and provided transformation from BPMN to this language. Instead, in our paper, we focus on monitoring of security properties, define how and where monitoring actions must be performed, and trigger the notification mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed tool supports model-driven development of processes that integrate security and compliance requirements across all phases of the system life-cycle. Together with [17] a formal methodology for the automatic synthesis of a secure orchestrator, a set of BPMN processes is described to guarantee non-disclosure of messages exchanged in processes. Finally, model checking techniques are used for evaluating security aspects of business processes in dynamic environments [20].…”
Section: Related Workmentioning
confidence: 99%