2010
DOI: 10.1007/978-3-642-12459-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Model Checking of Security-Sensitive Business Processes

Abstract: Abstract. Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that model checking can be profitably used for the automatic analysis of security-sensitive business processes. But building a formal model that simultaneously accounts for both the workflow and the access control policy is a time consuming and error-prone activity. In this paper we present a new approach to model checking secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
29
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 34 publications
(31 citation statements)
references
References 13 publications
2
29
0
Order By: Relevance
“…Intuitively, formal verification amounts to check whether possible executions of the business process model satisfy some desired properties, like generic correctness criteria (such as deadlock freedom or executability of activities) or domaindependent constraints. To enable formal verification and other forms of reasoning support, business process models are translated into an equivalent formal representation, which typically relies on variants of Petri nets [1], transition systems [2], or process algebras [19]. Properties are then formalized using temporal logics, using model checking techniques to actually carry out verification tasks [9].…”
Section: Introductionmentioning
confidence: 99%
“…Intuitively, formal verification amounts to check whether possible executions of the business process model satisfy some desired properties, like generic correctness criteria (such as deadlock freedom or executability of activities) or domaindependent constraints. To enable formal verification and other forms of reasoning support, business process models are translated into an equivalent formal representation, which typically relies on variants of Petri nets [1], transition systems [2], or process algebras [19]. Properties are then formalized using temporal logics, using model checking techniques to actually carry out verification tasks [9].…”
Section: Introductionmentioning
confidence: 99%
“…1 Charlie's message contains all the documents to support his request and it is suitably signed. Upon reception of the request, Ed has appropriate support for checking the signature of the document and comparing it with the identity of the sender of the request: if the signature and the identity of the requester do not match, then the request is immediately refused and the sender is acknowledged of this fact; otherwise, Ed starts to consider the content of the request for the car registration.…”
Section: A Running Example: Car Registration Officementioning
confidence: 99%
“…SATMC has been used to model check BPs against high-level authorization requirements [10]. Moreover, SATMC lies at the core of a Security Validation prototype for BPs developed by the Product Security Research unit at SAP.…”
Section: Success Storiesmentioning
confidence: 99%