A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models

被引:2
|
作者
Jesus Varela-Vaca, Angel [1 ]
Borrego, Diana [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Gasca, Rafael M. [1 ]
机构
[1] Univ Seville, Seville, Spain
来源
BUSINESS INFORMATION SYSTEMS (BIS 2016) | 2016年 / 255卷
关键词
Artifact-centric business process model; Verification; Security; Declarative security policy; Usage control model; SYSTEMS;
D O I
10.1007/978-3-319-39426-8_23
中图分类号
F [经济];
学科分类号
02 ;
摘要
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity-centric workflow description inadequate. Several artifact-centric initiatives pursue the verification of the structural and data perspectives of the models, but unfortunately uncovering security aspects. Security has become a crucial priority from the business and customer perspectives, and a complete verification procedure should also fulfill it. We propose an extension of artifact-centric process models based on the Usage Control Model which introduces mechanisms to specify security policies. An automatic transformation is provided to enable the verification of enriched artifact-centric models using existing verification correctness algorithms.
引用
收藏
页码:289 / 301
页数:13
相关论文
共 7 条
  • [1] Automating correctness verification of artifact-centric business process models
    Borrego, Diana
    Gasca, Rafael M.
    Gomez-Lopez, Maria Teresa
    INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 62 : 187 - 197
  • [2] Verification and Validation of UML Artifact-Centric Business Process Models
    Estanol, Montserrat
    Sancho, Maria-Ribera
    Teniente, Ernest
    ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2015, 2015, 9097 : 434 - 449
  • [3] The Description Logics Model of Artifact-centric Business Process System and Verification of artifact
    Wan, Xiaomei
    Zhao, Wei
    Liu, Guohua
    Yue, Xiaoli
    2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 1098 - 1102
  • [4] Reasoning on the Usage Control Security policies over Data Artifact Business Process Models
    Estanol, Montserrat
    Varela-Vaca, Angel Jesus
    Gomez-Lopez, Maria Teresa
    Teniente, Ernest
    Gasca, Rafael M.
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2022, 19 (02) : 547 - 572
  • [5] Conceptual Workflow Verification and Optimization for Artifact-centric Business Process
    Li, Dong
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 142 - 146
  • [6] The Adaptation of a Model of an Artifact-Centric Business Process Instance and Its Validation
    Zhang, Junbao
    Liu, Guohua
    INFORMATION, 2019, 10 (02):
  • [7] Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
    Varela-Vaca, Angel J.
    Parody, Luisa
    Gasca, Rafael M.
    Gomez-Lopez, Maria T.
    IEEE ACCESS, 2019, 7 : 26448 - 26465