Attribute-Based Security Verification of Business Process Models

被引:5
|
作者
Argyropoulos, Nikolaos [1 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
关键词
Business Process Security; Security Verification; Business Process Modelling; BPMN;
D O I
10.1109/CBI.2017.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business processes, as the instruments used by organisations to produce value, need to comply with a number of internally and externally imposed standards and restrictions. Since the majority of such processes involve the exchange of sensitive third party information, their compliance to security constraints needs to be verified before they can be implemented. Current attempts for the verification of security compliance of design-time business process models involve the transformation of both the model and the desired security properties into formal specifications, which can be then used as input for automated model checkers. Such an approach is usually costly both in terms of time and specialised knowledge, while also its coverage can be limited to specific types of security requirements. In this work we introduce an approach for the verification of security in business process models based on structural properties of the workflow of the process. To that end, we introduce a series of attributes to existing BPMN 2.0 concepts and algorithms for checking the compliance of a process model against the most common security requirements. Finally, a real-world business process is used to demonstrate and evaluate the applicability of our proposal.
引用
收藏
页码:43 / 52
页数:10
相关论文
共 50 条
  • [1] Enhanced Security of Attribute-Based Signatures
    Bloemer, Johannes
    Eidens, Fabian
    Juhnke, Jakob
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 235 - 255
  • [2] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [3] A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models
    Yang, Yueting
    He, Fazhi
    Han, Soonhung
    Liang, Yaqian
    Cheng, Yuan
    ENGINEERING, 2021, 7 (06) : 787 - 797
  • [4] Dedicated Hardware for Attribute-Based Credential Verification
    Ottoy, Geoffrey
    Lapon, Jorn
    Naessens, Vincent
    Preneel, Bart
    De Strycker, Lieven
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 50 - 65
  • [5] Threshold attribute-based signature and its security
    Ma, Chun-Guang
    Shi, Lan
    Zhou, Chang-Li
    Wang, Ding
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (05): : 1012 - 1015
  • [6] Attribute-based variability in feature models
    Karatas, Ahmet Serkan
    Oguztuzun, Halit
    REQUIREMENTS ENGINEERING, 2016, 21 (02) : 185 - 208
  • [7] Attribute-based variability in feature models
    Ahmet Serkan Karataş
    Halit Oğuztüzün
    Requirements Engineering, 2016, 21 : 185 - 208
  • [8] Approaches to Face Verification Through Attribute-Based Attention
    Subramanian, Arun Kumar
    Namboodiri, Anoop
    COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS, VISIGRAPP 2023, 2024, 2103 : 135 - 160
  • [9] Attribute-based Server-Aided Verification Signature
    Wang, Zhiwei
    Xie, Ruirui
    Wang, Shaohui
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3183 - 3190
  • [10] Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
    Varela-Vaca, Angel J.
    Parody, Luisa
    Gasca, Rafael M.
    Gomez-Lopez, Maria T.
    IEEE ACCESS, 2019, 7 : 26448 - 26465