Proceedings of the 2011 ACM Symposium on Applied Computing 2011
DOI: 10.1145/1982185.1982254
|View full text |Cite
|
Sign up to set email alerts
|

Strong non-leak guarantees for workflow models

Abstract: Despite the correct deployment of access control mechanisms, information leaks can persist and undermine the compliance of workflows to regulations and policies. This paper proposes InDico, a framework for the automated detection of information leaks in workflow models based on static information flow analysis. InDico identifies leaks induced by the structure of the workflow, i.e. its control flow. To this end, it translates workflow models, e.g. in BPEL or BPMN, into Petri nets and conducts the static informa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…(Accorsi et al, 2011a), (Accorsi et al, 2011b), (Accorsi et al, 2012), (Fenz et al, 2009), , (Lehmann et al, 2013), and (Lohmann et al, 2009)) and confidentiality determination methods implemented as part of different risk assessment methods (e.g., NIST (Barker et al, 2008a), Magerit (Spanish Ministry for Public Administrations, 2006), and Mehari (CLUSIF, 2010)). When dealing with confidentiality requirements in business processes one of the first decisions to make is the level to which each asset should be protected.…”
Section: Related Workmentioning
confidence: 99%
“…(Accorsi et al, 2011a), (Accorsi et al, 2011b), (Accorsi et al, 2012), (Fenz et al, 2009), , (Lehmann et al, 2013), and (Lohmann et al, 2009)) and confidentiality determination methods implemented as part of different risk assessment methods (e.g., NIST (Barker et al, 2008a), Magerit (Spanish Ministry for Public Administrations, 2006), and Mehari (CLUSIF, 2010)). When dealing with confidentiality requirements in business processes one of the first decisions to make is the level to which each asset should be protected.…”
Section: Related Workmentioning
confidence: 99%
“…information flow analysis [3,7,17,29]) on basis of process logs are envisioned, recovered models have to fulfill strict requirements. Specifically, mined models have to show the exact log behavior without introducing additional behavior.…”
Section: Control Flow Discovery Appliedmentioning
confidence: 99%
“…As shown in [7], information on the structure, data flow and data dependencies can be used to effectively detect information flows and, hence, help auditors in searching for violations of isolation properties. On the other hand, there are no approaches combining all three dimensions.…”
Section: Case and Data Perspectivementioning
confidence: 99%
“…Based upon InDico [2], the mined workflow specifications can be automatically tested for a multitude of security properties, including MAC-based, non-interference, and enterprise relevant properties, such as Chinese-wall and separation of duties. InDico aims to provide a well-founded, uniform approach and corresponding tool-support for the automated analysis of existing and/or mined workflow specifications for security properties.…”
Section: Expected Impactmentioning
confidence: 99%