Attribute-Based Security Verification of Business Process Models

被引:5
|
作者
Argyropoulos, Nikolaos [1 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
关键词
Business Process Security; Security Verification; Business Process Modelling; BPMN;
D O I
10.1109/CBI.2017.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business processes, as the instruments used by organisations to produce value, need to comply with a number of internally and externally imposed standards and restrictions. Since the majority of such processes involve the exchange of sensitive third party information, their compliance to security constraints needs to be verified before they can be implemented. Current attempts for the verification of security compliance of design-time business process models involve the transformation of both the model and the desired security properties into formal specifications, which can be then used as input for automated model checkers. Such an approach is usually costly both in terms of time and specialised knowledge, while also its coverage can be limited to specific types of security requirements. In this work we introduce an approach for the verification of security in business process models based on structural properties of the workflow of the process. To that end, we introduce a series of attributes to existing BPMN 2.0 concepts and algorithms for checking the compliance of a process model against the most common security requirements. Finally, a real-world business process is used to demonstrate and evaluate the applicability of our proposal.
引用
收藏
页码:43 / 52
页数:10
相关论文
共 50 条
  • [21] Security pitfalls of "ePASS: An expressive attribute-based signature scheme"
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 30 : 40 - 45
  • [22] Security-Enhanced Function Privacy Attribute-Based Encryption
    Li, Xinmin
    Zhang, Leyou
    Hou, Xuanyang
    FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 176 - 188
  • [23] ATTRIBUTE-BASED KNOWLEDGE REPRESENTATION IN THE PROCESS OF DEFECT DIAGNOSIS
    Gorny, Z.
    Kluska-Nawarecka, S.
    Wilk-Kolodziejczyk, D.
    ARCHIVES OF METALLURGY AND MATERIALS, 2010, 55 (03) : 819 - 826
  • [24] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [25] Multiple Authorities Attribute-Based Verification Mechanism for Blockchain Mircogrid Transactions
    Khan, Sarmadullah
    Khan, Rafiullah
    ENERGIES, 2018, 11 (05)
  • [26] Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 897 - 911
  • [27] An Efficient Verification Approach to Separation of Duty in Attribute-Based Access Control
    Yang, Benyuan
    Hu, Hesuan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (09) : 4428 - 4442
  • [28] Attribute-based learning
    Bratko, I
    Cestnik, B
    Kononenko, I
    AI COMMUNICATIONS, 1996, 9 (01) : 27 - 32
  • [29] Attribute-based signature with AT
    Ma, Chun-Guang
    Shi, Lan
    Wang, Ding
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2013, 42 (03): : 410 - 414
  • [30] Attribute-Based Signatures
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 376 - +