Attribute-Based Security Verification of Business Process Models

被引:5
作者
Argyropoulos, Nikolaos [1 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
来源
2017 IEEE 19TH CONFERENCE ON BUSINESS INFORMATICS (CBI), VOL 1 | 2017年 / 1卷
关键词
Business Process Security; Security Verification; Business Process Modelling; BPMN;
D O I
10.1109/CBI.2017.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business processes, as the instruments used by organisations to produce value, need to comply with a number of internally and externally imposed standards and restrictions. Since the majority of such processes involve the exchange of sensitive third party information, their compliance to security constraints needs to be verified before they can be implemented. Current attempts for the verification of security compliance of design-time business process models involve the transformation of both the model and the desired security properties into formal specifications, which can be then used as input for automated model checkers. Such an approach is usually costly both in terms of time and specialised knowledge, while also its coverage can be limited to specific types of security requirements. In this work we introduce an approach for the verification of security in business process models based on structural properties of the workflow of the process. To that end, we introduce a series of attributes to existing BPMN 2.0 concepts and algorithms for checking the compliance of a process model against the most common security requirements. Finally, a real-world business process is used to demonstrate and evaluate the applicability of our proposal.
引用
收藏
页码:43 / 52
页数:10
相关论文
共 50 条
[21]   Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security [J].
Akerlund, Agnes ;
Grosse, Christine .
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, :281-288
[22]   A formal approach to modeling and verification of business process collaborations [J].
Corradini, Flavio ;
Fornari, Fabrizio ;
Polini, Andrea ;
Re, Barbara ;
Tiezzi, Francesco .
SCIENCE OF COMPUTER PROGRAMMING, 2018, 166 :35-70
[23]   Verification of Business Process Entailment Constraints Using SPIN [J].
Wolter, Christian ;
Miseldine, Philip ;
Meinel, Christoph .
ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 :1-+
[24]   Ontological Description and Similarity-Based Discovery of Business Process Models [J].
Belhajjame, Khalid ;
Brambilla, Marco .
INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2011, 2 (02) :47-66
[25]   Verification of BPMN 2.0 process models: An event log-based approach [J].
Allani, Olfa ;
Ghannouchi, Sonia Ayachi .
INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016, 2016, 100 :1064-1070
[26]   Improving Quality of Business Process Models [J].
Sanchez-Gonzalez, Laura ;
Ruiz, Francisco ;
Garcia, Felix ;
Piattini, Mario .
EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2011, 2013, 275 :130-144
[27]   Deriving Collaborative Models from Business Process Models [J].
Giraldo, Faber ;
Alzate, Alexander ;
Duarte, Laura ;
Tobon, Monica ;
Hoyos, Briyan .
2011 6TH COLOMBIAN COMPUTING CONGRESS (CCC), 2011,
[28]   Toward automated verification of timed business process models using timed-automata networks and temporal properties [J].
Dechsupa, Chanon ;
Vatanawood, Wiwat ;
Thongtak, Arthit .
INFORMATION SCIENCES, 2025, 710
[29]   Process mining approach to formal business process modelling and verification: a case study [J].
Ito, Sohei ;
Vymetal, Dominik ;
Sperka, Roman .
JOURNAL OF MODELLING IN MANAGEMENT, 2021, 16 (02) :602-622
[30]   An Approach for Extracting Business Vocabularies from Business Process Models [J].
Skersys, Tomas ;
Butleris, Rimantas ;
Kapocius, Kestutis ;
Vileiniskis, Tomas .
INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02) :178-190