A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models

被引:2
|
作者
Jesus Varela-Vaca, Angel [1 ]
Borrego, Diana [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Gasca, Rafael M. [1 ]
机构
[1] Univ Seville, Seville, Spain
来源
BUSINESS INFORMATION SYSTEMS (BIS 2016) | 2016年 / 255卷
关键词
Artifact-centric business process model; Verification; Security; Declarative security policy; Usage control model; SYSTEMS;
D O I
10.1007/978-3-319-39426-8_23
中图分类号
F [经济];
学科分类号
02 ;
摘要
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity-centric workflow description inadequate. Several artifact-centric initiatives pursue the verification of the structural and data perspectives of the models, but unfortunately uncovering security aspects. Security has become a crucial priority from the business and customer perspectives, and a complete verification procedure should also fulfill it. We propose an extension of artifact-centric process models based on the Usage Control Model which introduces mechanisms to specify security policies. An automatic transformation is provided to enable the verification of enriched artifact-centric models using existing verification correctness algorithms.
引用
收藏
页码:289 / 301
页数:13
相关论文
共 43 条
  • [31] Modular Term-Rewriting Framework for Artifact-Centric Business Process Modelling
    Zielinski, Bartosz
    MODEL AND DATA ENGINEERING (MEDI 2017), 2017, 10563 : 71 - 78
  • [33] Guided Interaction Exploration and Performance Analysis in Artifact-Centric Process Models
    Maikel L. van Eck
    Natalia Sidorova
    Wil M. P. van der Aalst
    Business & Information Systems Engineering, 2019, 61 : 649 - 663
  • [34] An XACML Extension for Business Process-centric Access Control Policies
    Wolter, Christian
    Weiss, Christian
    Meinel, Christoph
    2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 166 - +
  • [35] Modeling uncertainty in declarative artifact-centric process models using fuzzy logic
    Eshuis, Rik
    Firat, Murat
    Kaymak, Uzay
    INFORMATION SCIENCES, 2021, 579 : 845 - 862
  • [36] On Business Process Redesign and Configuration: Leveraging Data Mining Classification & Outliers and Artifact-Centric Process Modeling
    Thai-Minh Truong
    Lam-Son Le
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2016, : 59 - 66
  • [37] An Artifact-Centric Approach to Generating Web-Based Business Process Driven User Interfaces
    Yongchareon, Sira
    Liu, Chengfei
    Zhao, Xiaohui
    Xu, Jiajie
    WEB INFORMATION SYSTEM ENGINEERING-WISE 2010, 2010, 6488 : 419 - 427
  • [38] Specification and verification of artifact Behaviors in business process models
    Gerede, Cagdas E.
    Su, Jianwen
    SERVICE-ORIENTED COMPUTING - ICSOC 2007, PROCEEDINGS, 2007, 4749 : 181 - +
  • [39] Toward a Verification of Time-centric Business Process Models
    Cheikhrouhou, Saoussen
    Kallel, Slim
    Jmaiel, Mohamed
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 326 - 331
  • [40] Attribute-Based Security Verification of Business Process Models
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    2017 IEEE 19TH CONFERENCE ON BUSINESS INFORMATICS (CBI), VOL 1, 2017, 1 : 43 - 52