A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models

被引:2
|
作者
Jesus Varela-Vaca, Angel [1 ]
Borrego, Diana [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Gasca, Rafael M. [1 ]
机构
[1] Univ Seville, Seville, Spain
来源
BUSINESS INFORMATION SYSTEMS (BIS 2016) | 2016年 / 255卷
关键词
Artifact-centric business process model; Verification; Security; Declarative security policy; Usage control model; SYSTEMS;
D O I
10.1007/978-3-319-39426-8_23
中图分类号
F [经济];
学科分类号
02 ;
摘要
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity-centric workflow description inadequate. Several artifact-centric initiatives pursue the verification of the structural and data perspectives of the models, but unfortunately uncovering security aspects. Security has become a crucial priority from the business and customer perspectives, and a complete verification procedure should also fulfill it. We propose an extension of artifact-centric process models based on the Usage Control Model which introduces mechanisms to specify security policies. An automatic transformation is provided to enable the verification of enriched artifact-centric models using existing verification correctness algorithms.
引用
收藏
页码:289 / 301
页数:13
相关论文
共 43 条
  • [11] Artifact-centric business process models and similarity search method
    Liu, Hai-Bin
    Liu, Guo-Hua
    Huang, Li-Ming
    Song, Jin-Ling
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2013, 19 (08): : 1810 - 1821
  • [12] Conformance checking in UML artifact-centric business process models
    Montserrat Estañol
    Jorge Munoz-Gama
    Josep Carmona
    Ernest Teniente
    Software & Systems Modeling, 2019, 18 : 2531 - 2555
  • [13] Conformance checking in UML artifact-centric business process models
    Estanol, Montserrat
    Munoz-Gama, Jorge
    Carmona, Josep
    Teniente, Ernest
    SOFTWARE AND SYSTEMS MODELING, 2019, 18 (04): : 2531 - 2555
  • [14] Reasoning on the Usage Control Security policies over Data Artifact Business Process Models
    Estanol, Montserrat
    Varela-Vaca, Angel Jesus
    Gomez-Lopez, Maria Teresa
    Teniente, Ernest
    Gasca, Rafael M.
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2022, 19 (02) : 547 - 572
  • [15] Behavioral Conformance of Artifact-Centric Process Models
    Fahland, Dirk
    de Leoni, Massimiliano
    van Dongen, Boudewijn F.
    van der Aalst, Wil M. P.
    BUSINESS INFORMATION SYSTEMS, 2011, 87 : 37 - 49
  • [16] Toward activity mapping for Artifact-Centric business process
    Yin, Yuyu
    Zhu, Zhengshuang
    Gao, Min
    Song, Aihua
    International Journal of u- and e- Service, Science and Technology, 2016, 9 (06) : 421 - 432
  • [17] The Adaptation of a Model of an Artifact-Centric Business Process Instance and Its Validation
    Zhang, Junbao
    Liu, Guohua
    INFORMATION, 2019, 10 (02):
  • [18] Reusing artifact-centric business process models: a behavioral consistent specialization approach
    Yongchareon, Sira
    Liu, Chengfei
    Zhao, Xiaohui
    COMPUTING, 2020, 102 (08) : 1843 - 1879
  • [19] Static analysis of business artifact-centric operational models
    Gerede, Cagdas E.
    Bhattacharya, Kamal
    Su, Jianwen
    IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 133 - +
  • [20] A Process View Framework for Artifact-Centric Business Processes
    Yongchareon, Sira
    Liu, Chengfei
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT I, 2010, 6426 : 26 - 43