Attribute-Based Security Verification of Business Process Models

被引:5
作者
Argyropoulos, Nikolaos [1 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
来源
2017 IEEE 19TH CONFERENCE ON BUSINESS INFORMATICS (CBI), VOL 1 | 2017年 / 1卷
关键词
Business Process Security; Security Verification; Business Process Modelling; BPMN;
D O I
10.1109/CBI.2017.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business processes, as the instruments used by organisations to produce value, need to comply with a number of internally and externally imposed standards and restrictions. Since the majority of such processes involve the exchange of sensitive third party information, their compliance to security constraints needs to be verified before they can be implemented. Current attempts for the verification of security compliance of design-time business process models involve the transformation of both the model and the desired security properties into formal specifications, which can be then used as input for automated model checkers. Such an approach is usually costly both in terms of time and specialised knowledge, while also its coverage can be limited to specific types of security requirements. In this work we introduce an approach for the verification of security in business process models based on structural properties of the workflow of the process. To that end, we introduce a series of attributes to existing BPMN 2.0 concepts and algorithms for checking the compliance of a process model against the most common security requirements. Finally, a real-world business process is used to demonstrate and evaluate the applicability of our proposal.
引用
收藏
页码:43 / 52
页数:10
相关论文
共 17 条
[1]  
[Anonymous], 2011, TECH REP
[2]  
Armando A, 2010, LECT NOTES COMPUT SC, V5983, P66
[3]  
Arsac W, 2011, LECT NOTES COMPUT SC, V6542, P29, DOI 10.1007/978-3-642-19125-1_3
[4]  
Becker J., 2012, BuR-BusinessResearch, V5, P221
[5]  
Brucker A.D., 2012, LNBIP, V132, P662
[6]  
Cherdantseva Yulia, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P546, DOI 10.1109/ARES.2013.72
[7]   Business Process Compliance via Security Validation as a Service [J].
Compagna, Luca ;
Guilleminot, Pierre ;
Brucker, Achim D. .
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2013), 2013, :455-462
[8]  
El Kharbili M., 2008, Modellierung betrieblicher Informationssysteme-Modellierung zwischen SOA und Compliance Management-27.-28. November 2008 Saarbrucken, P107
[9]  
Groefsema H., 2013, 3 INT S BUS MOD SOFT, V1, P198
[10]  
ISO, 2014, 27000 ISO ISOIEC