Loading...
Please wait, while we are loading the content...
Similar Documents
Model Checking of Security-sensitive Business Processes?
| Content Provider | CiteSeerX |
|---|---|
| Author | Arm, Ro Ponta, Serena Elisa |
| Abstract | Abstract. Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization con-straints). In previous works it has been shown that model checking can be profitably used for the automatic analysis of security-sensitive busi-ness processes. But building a formal model that simultaneously accounts for both the workflow and the access control policy is a time consum-ing and error-prone activity. In this paper we present a new approach to model checking security-sensitive business processes that allows for the separate specification of the workflow and of the associated security policy while retaining the ability to carry out a fully automatic analysis of the process. To illustrate the effectiveness of the approach we describe its application to a version of the Loan Origination Process featuring an RBAC access control policy extended with delegation. 1 |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Security-sensitive Business Process Model Checking Automatic Analysis Security Requirement Separate Specification Security-sensitive Busi-ness Process Error-prone Activity Rbac Access Control Policy Loan Origination Process Security-sensitive Business Business Process Associated Security Policy Authorization Con-straints Access Control Policy Formal Model |
| Content Type | Text |
| Resource Type | Article |