2014
DOI: 10.1007/978-3-662-43745-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Verifying Security Policies in Business Processes

Abstract: Modern information systems are large-sized and comprise multiple heterogeneous and autonomous components. Autonomy enables decentralization, but it also implies that components providers are free to change, retire, or introduce new components. This is a threat to security, and calls for a continuous verification process to ensure compliance with security policies. Existing verification frameworks either have limited expressiveness-thereby inhibiting the specification of real-world requirements-, or rely on for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 39 publications
(35 citation statements)
references
References 23 publications
0
35
0
Order By: Relevance
“…SecBPMN [10] is framework for modeling business processes with security aspects, to model security policies and to verify if such security policies are satisfies by the business processes. It is composed by: SecBPMN-ml, SecBPMN-Q and a software components.…”
Section: Secbpmnmentioning
confidence: 99%
See 2 more Smart Citations
“…SecBPMN [10] is framework for modeling business processes with security aspects, to model security policies and to verify if such security policies are satisfies by the business processes. It is composed by: SecBPMN-ml, SecBPMN-Q and a software components.…”
Section: Secbpmnmentioning
confidence: 99%
“…Assuming the predicates that details the security annotations of the security policy are less restrictive of the predicates of the business process, the business process satisfies the security policy. For further details, please refer to [10].…”
Section: Secbpmnmentioning
confidence: 99%
See 1 more Smart Citation
“…It requires a system to ensure completeness, accuracy and absence of unauthorized modifications in all its components [8]. It can be linked to one task, data object or message flow (Tab.…”
Section: Security Enforcement Rulesmentioning
confidence: 99%
“…SecBPMN [8] and SecureBPMN [9] are two examples of modeling languages where specific annotations are introduced to extend BPMN with security concepts. However, no approach has been proposed so far to handle with security as a global concern across process-centric and artifact-centric dimensions.…”
Section: Introductionmentioning
confidence: 99%