The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007) 2007
DOI: 10.1109/secureware.2007.4385334
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Business Workflows and Role Based Access Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…a∈A r∈R G(executed(a, r, intRating) ⇒ G(executed(a, r, extRating) ⇒ G ¬ activated(a, r))) (3) where R is the set of roles involved in the process and executed(a, r, t) abbreviates the formula (granted(a, r, t) ∧ X exec(a, t)). Thus instead of changing AWS 0 into a new access-controlled workflow system AWS 1 implementing the above mechanism and checking whether |= AWS 1 (1), we asked SATMC to check whether |= AWS 0 ((3) ⇒ (1)).…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…a∈A r∈R G(executed(a, r, intRating) ⇒ G(executed(a, r, extRating) ⇒ G ¬ activated(a, r))) (3) where R is the set of roles involved in the process and executed(a, r, t) abbreviates the formula (granted(a, r, t) ∧ X exec(a, t)). Thus instead of changing AWS 0 into a new access-controlled workflow system AWS 1 implementing the above mechanism and checking whether |= AWS 1 (1), we asked SATMC to check whether |= AWS 0 ((3) ⇒ (1)).…”
Section: Methodsmentioning
confidence: 99%
“…An approach to the combined modeling of business workflows with RBAC models is presented in [3]. The paper proposes an extended finite state machine model that allows for the model checking of SoD properties by using the model checker SPIN.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Dury et al [14] discussed an experimental result of applying a model checking technology for verifying RBAC on workflows. A modeling method is an effective example of applying a model checking.…”
Section: Related Workmentioning
confidence: 99%
“…Literatures [1][2][3] formally analyze and validate security strategy model, literature [4] validates the functional and authorization attributes using UML. Literature [5] utilizes formal method to validate security attributes of operating system.…”
Section: Introductionmentioning
confidence: 99%