Security Validation of Business Processes via Model-Checking

被引:0
|
作者
Arsac, Wihem [1 ]
Compagna, Luca [1 ]
Pellegrino, Giancarlo [1 ]
Ponta, Serena Elisa [1 ]
机构
[1] SAP Res Sophia Antipolis, F-06250 Mougins, France
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
More and more industrial activities are captured through Business Processes (BPs). To evaluate whether a BP under-design enjoys certain security desiderata is hardly manageable by business analysts without tool support, as the BP runtime environment is highly dynamic (e.g., task delegation). Automated reasoning techniques such as model checking can provide the required level of assurance but suffer of well-known obstacles for the adoption in industrial systems, e.g. they require a strong logical and mathematical background. In this paper, we present a novel security validation approach for BPs that employs state-of-the-art. model checking techniques for evaluating security-relevant aspects of BPs in dynamic environments and offers accessible user interfaces and apprehensive feedback for business analysts so to be suitable for industry.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 50 条
  • [1] Compositional Verification of Business Processes by Model-Checking
    Mendoza, Luis E.
    Capel, Manuel I.
    Perez, Maria
    [J]. MSVVEIS 2010: MODELLING, SIMULATION, VERIFICATION AND VALIDATION OF ENTERPRISE INFORMATION SYSTEMS, 2010, : 60 - 69
  • [2] Model-checking processes with data
    Groote, JF
    Willemse, TAC
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2005, 56 (03) : 251 - 273
  • [3] LTL model-checking for security protocols
    Carbone, Roberto
    [J]. AI COMMUNICATIONS, 2011, 24 (03) : 281 - 283
  • [4] Pushdown processes: Games and model-checking
    Walukiewicz, I
    [J]. INFORMATION AND COMPUTATION, 2001, 164 (02) : 234 - 263
  • [5] Verifying Business Rules Using Model-Checking Techniques for Non-specialist in Model-Checking
    Aoki, Yoshitaka
    Matsuura, Saeko
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (05) : 1097 - 1108
  • [6] Model Checking of Security-Sensitive Business Processes
    Armando, Alessandro
    Ponta, Serena Elisa
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 66 - 80
  • [7] Model-checking for validation of a Fault Protection system
    Feather, MS
    Fickas, S
    Razermera-Mamy, NA
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 32 - 41
  • [8] A model-checking verification environment for mobile processes
    Ferrari, GL
    Gnesi, S
    Montanari, U
    Pistore, M
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2003, 12 (04) : 440 - 473
  • [9] Model-checking web services business activity protocols
    Marques Jr. A.P.
    Ravn A.P.
    Srba J.
    Vighio S.
    [J]. International Journal on Software Tools for Technology Transfer, 2013, 15 (2) : 125 - 147
  • [10] Model-checking of specifications integrating processes, data and time
    Hoenicke, J
    Maier, P
    [J]. FM 2005: FORMAL METHODS, PROCEEDINGS, 2005, 3582 : 465 - 480