Proceedings of the 17th ACM Symposium on Access Control Models and Technologies 2012
DOI: 10.1145/2295136.2295160
|View full text |Cite
|
Sign up to set email alerts
|

SecureBPMN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 73 publications
(9 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…We see these techniques and standards as complementary to our work, as they can be used for the implementation of our abstract specifications. BPMN extensions to annotate business process diagrams with security annotations can be found in [6,26,33]. Closest to the security requirements considered by us comes the notation proposed in [33] that supports both the annotation of activities with separation of duty constraints and the annotation of documents and process lanes with confidentiality and integrity classifications or clearances, respectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We see these techniques and standards as complementary to our work, as they can be used for the implementation of our abstract specifications. BPMN extensions to annotate business process diagrams with security annotations can be found in [6,26,33]. Closest to the security requirements considered by us comes the notation proposed in [33] that supports both the annotation of activities with separation of duty constraints and the annotation of documents and process lanes with confidentiality and integrity classifications or clearances, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…constraints on the flow of information. Several proposals to extend BPMN with graphical notations for both kinds of security requirements exist [6,26,33].…”
Section: Introductionmentioning
confidence: 99%
“…Overall, SecureBPMN [12] enables the specification of security properties at a fine granular level. For example, separation of duty and binding of duty can restrict individual permissions (e. g., completing a task requires two clerks or one manager ) rather than restricting the whole task.…”
Section: Secure Business Processes: An Examplementioning
confidence: 99%
“…While there are works, e. g., [12,28], that use process level security specifications for generating configurations for access control infrastructures such as XACML [21], we are not aware of any works that allow for checking process level security and compliance properties on the actual implementations of user interfaces or services. In the following, we present an approach that allows for checking the conformance of source code artifacts to process level requirement specifications.…”
Section: Secure Business Processes: An Examplementioning
confidence: 99%
See 1 more Smart Citation