Attribute-Based Security Verification of Business Process Models

被引:5
|
作者
Argyropoulos, Nikolaos [1 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
关键词
Business Process Security; Security Verification; Business Process Modelling; BPMN;
D O I
10.1109/CBI.2017.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business processes, as the instruments used by organisations to produce value, need to comply with a number of internally and externally imposed standards and restrictions. Since the majority of such processes involve the exchange of sensitive third party information, their compliance to security constraints needs to be verified before they can be implemented. Current attempts for the verification of security compliance of design-time business process models involve the transformation of both the model and the desired security properties into formal specifications, which can be then used as input for automated model checkers. Such an approach is usually costly both in terms of time and specialised knowledge, while also its coverage can be limited to specific types of security requirements. In this work we introduce an approach for the verification of security in business process models based on structural properties of the workflow of the process. To that end, we introduce a series of attributes to existing BPMN 2.0 concepts and algorithms for checking the compliance of a process model against the most common security requirements. Finally, a real-world business process is used to demonstrate and evaluate the applicability of our proposal.
引用
收藏
页码:43 / 52
页数:10
相关论文
共 50 条
  • [11] A Survey of Blockchain Security Technologies Based on Attribute-based Cryptography
    Chen L.
    Xiang F.
    Sun Z.-X.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (01): : 192 - 200
  • [12] Improving Security and Efficiency in Attribute-Based Data Sharing
    Hur, Junbeom
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) : 2271 - 2282
  • [13] Verification of X.509 Attribute Certificates for Attribute-based Authorization: A Practical Approach
    Berbecaru, Diana
    2021 25TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2021, : 346 - 351
  • [14] Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification
    Ren, Yan
    Wang, Guilin
    Hu, Yunhong
    Wang, Qiuyan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (11): : 2341 - 2348
  • [15] Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
    Escala, Alex
    Herranz, Javier
    Morillo, Paz
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 224 - 241
  • [16] Outsourcing Attribute-Based Encryption to Enhance IoT Security and Performance
    Taha, Mohammad Bany
    Khasawneh, Fawaz A.
    Quttoum, Ahmad Nahar
    Alshammari, Muteb
    Alomari, Zakaria
    IEEE ACCESS, 2024, 12 : 166800 - 166813
  • [17] attribute-based ring signatures: security analysis and a new construction
    Toluee, Rahim
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [18] Attribute-Based Adaptive Homomorphic Encryption for Big Data Security
    Thenmozhi, R.
    Shridevi, S.
    Mohanty, Sachi Nandan
    Garcia Diaz, Vicente
    Gupta, Deepak
    Tiwari, Prayag
    Shorfuzzaman, Mohammad
    BIG DATA, 2024, 12 (05) : 343 - 356
  • [19] Attribute-Based Encryption Method for Data Privacy Security Protection
    Li, Ziqian
    He, Yeshen
    Zhang, Yiying
    Li, Siwei
    Wang, Cong
    Zhang, Xiankun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 458 - 467
  • [20] ZigBee Security For Home Automation Using Attribute-Based Cryptography
    Seo, Hwajeong
    Kim, CheolSoo
    Kim, Howon
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 367 - +