Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2714633
|View full text |Cite
|
Sign up to set email alerts
|

Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 18 publications
(35 citation statements)
references
References 23 publications
0
35
0
Order By: Relevance
“…First, we give precise statements of two SFPs together with a discussion of their relationships with the WSP (Section 2). Second, we describe techniques to solve them by adapting the technique for the synthesis of run-time monitors for the WSP developed in [5] (Section 3). Third, we validate our solutions on real-world examples from a library of re-usable business process models (Section 4).…”
Section: Example 1 (Trip Request Workflow (Trw))mentioning
confidence: 99%
See 4 more Smart Citations
“…First, we give precise statements of two SFPs together with a discussion of their relationships with the WSP (Section 2). Second, we describe techniques to solve them by adapting the technique for the synthesis of run-time monitors for the WSP developed in [5] (Section 3). Third, we validate our solutions on real-world examples from a library of re-usable business process models (Section 4).…”
Section: Example 1 (Trip Request Workflow (Trw))mentioning
confidence: 99%
“…We now briefly recall the technique in [5] to synthesize run-time monitors solving the WSP. This is important as it provides us with a compact data structure to represent the set of all eligible scenarios in a workflow, which is crucial for the design of an efficient solution to SFPs.…”
Section: From Solving the Wsp To Solving Sfpsmentioning
confidence: 99%
See 3 more Smart Citations