2014
DOI: 10.1515/itit-2014-1055
|View full text |Cite
|
Sign up to set email alerts
|

Information flow control for workflow management systems

Abstract: Workflow management plays an important role in analyzing and automating business processes. Security requirements in workflow management systems are typically mapped to (role-based) access control configurations. This paper focuses on information flow control, taking into account implicit information leaks. The presented approach operates on a specification level in which no executable program is available yet. We illustrate the modeling of a workflow management system as a composition of state-event systems, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The paper Xiaohui Liu and Youwang Sun, 2011 analyzes information flow management of information system in automobile parts inbound logistics based on the environment of internet of things. Bauereiß and Hutter, 2014 in their paper focuses on information flow control, taking into account implicit information leaks. The presented approach operates on a specification level in which no executable program is available yet.…”
Section: Methodsmentioning
confidence: 99%
“…The paper Xiaohui Liu and Youwang Sun, 2011 analyzes information flow management of information system in automobile parts inbound logistics based on the environment of internet of things. Bauereiß and Hutter, 2014 in their paper focuses on information flow control, taking into account implicit information leaks. The presented approach operates on a specification level in which no executable program is available yet.…”
Section: Methodsmentioning
confidence: 99%
“…is is contrast to our formalism, where workflow steps are executed synchronously by a set of agents. Information flow in business processes has been considered, e.g., in [4]. ere the MASK framework for possibilistic information flow security [26], and in particular a variant of the unwinding technique from [17], is used to prove that specifications satisfying particular constraints are safe.…”
Section: Related Workmentioning
confidence: 99%
“…We have implemented our approach into the tool NIWO. 4 Our tool takes as input the specification of a workflow together with declassification conditions and the number of causal agents. From that, it generates a sorted FOLTL formula whose satisfiability is equivalent to the existence of a violation of the non-interference property.…”
Section: Experimental Evaluationmentioning
confidence: 99%
See 2 more Smart Citations