A Process-Centric Approach to Insider Threats Identification in Information Systems

被引:0
|
作者
Idani, Akram [1 ]
Ledru, Yves [1 ]
Vega, German [1 ]
机构
[1] Univ Grenoble Alpes, LIG, Grenoble INP, CNRS, F-38000 Grenoble, France
关键词
B Method; CSP; Verification; RBAC; Access Control; SECURITY;
D O I
10.1007/978-3-031-61231-2_15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of complex software systems as done today generates countless security vulnerabilities that are difficult to detect. In this context, several research works have adopted the Model Driven Security (MDS) approach, which investigates software models rather than implementations. However, although these works provide useful techniques for security modeling and validation, they do not address the impact of functional behavior on the security context of the system, which can be cause for several flaws, specially insider threats. In order to address this challenge, we propose a dynamic analysis based on the B method for both functional and security concerns. Our contribution extends the B4MSecure platform that we developed in our previous works, by introducing a workflow-centric layer to model expected business processes, as well as possible malicious activities. This new layer is built on CSP parallel to B and brings new validation possibilities to B4MSecure.
引用
收藏
页码:231 / 247
页数:17
相关论文
共 50 条
  • [1] A process-centric approach to enterprise transformation
    Adensamer, RJ
    [J]. NOMS '96 - 1996 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS. 1-4, 1996, : 637 - 647
  • [2] Process-centric business intelligence
    Bucher, Tobias
    Gericke, Anke
    Sigg, Stefan
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2009, 15 (03) : 408 - 429
  • [3] Early Validation Framework for Critical and Complex Process-Centric Systems
    Golra, Fahad Rafique
    Champeau, Joel
    Teodorov, Ciprian
    [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2019, 352 : 35 - 50
  • [4] Language-Critical Development of Process-Centric Application Systems
    Amin, Tayyeb
    Grollius, Tobias
    Ortner, Erich
    [J]. EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2010, 69 : 31 - 46
  • [5] Ontology evolution: a process-centric survey
    Zablith, Fouad
    Antoniou, Grigoris
    d'Aquin, Mathieu
    Flouris, Giorgos
    Kondylakis, Haridimos
    Motta, Enrico
    Plexousakis, Dimitris
    Sabou, Marta
    [J]. KNOWLEDGE ENGINEERING REVIEW, 2015, 30 (01): : 45 - 75
  • [6] A Process-Centric Data Analytics Architecture
    Zaghloul, Mohamed M.
    Ali-Eldin, Amr
    Salem, Mofreh
    [J]. 2014 9TH INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS), 2014,
  • [7] MITIS - An Insider Threats Mitigation Framework for Information Systems
    Ali, Ahmad
    Ahmed, Mansoor
    Ilyas, Muhammad
    Kueng, Josef
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 407 - 415
  • [8] A Process-Centric Ontological Approach for Integrating Geo-Sensor Data
    Devaraju, Anusuriya
    Kuhn, Werner
    [J]. FORMAL ONTOLOGY IN INFORMATION SYSTEMS (FOIS 2010), 2010, 209 : 199 - 212
  • [9] Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems
    Nicho, Mathew
    Kamoun, Faouzi
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 35 : 333 - 356
  • [10] Process-centric enterprise modeling & management (Procem®)
    Ortner, Erich
    [J]. ENASE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2008, : 89 - 98