A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models

被引:2
|
作者
Jesus Varela-Vaca, Angel [1 ]
Borrego, Diana [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Gasca, Rafael M. [1 ]
机构
[1] Univ Seville, Seville, Spain
来源
BUSINESS INFORMATION SYSTEMS (BIS 2016) | 2016年 / 255卷
关键词
Artifact-centric business process model; Verification; Security; Declarative security policy; Usage control model; SYSTEMS;
D O I
10.1007/978-3-319-39426-8_23
中图分类号
F [经济];
学科分类号
02 ;
摘要
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity-centric workflow description inadequate. Several artifact-centric initiatives pursue the verification of the structural and data perspectives of the models, but unfortunately uncovering security aspects. Security has become a crucial priority from the business and customer perspectives, and a complete verification procedure should also fulfill it. We propose an extension of artifact-centric process models based on the Usage Control Model which introduces mechanisms to specify security policies. An automatic transformation is provided to enable the verification of enriched artifact-centric models using existing verification correctness algorithms.
引用
收藏
页码:289 / 301
页数:13
相关论文
共 43 条
  • [41] Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
    Varela-Vaca, Angel J.
    Parody, Luisa
    Gasca, Rafael M.
    Gomez-Lopez, Maria T.
    IEEE ACCESS, 2019, 7 : 26448 - 26465
  • [42] An Extension of Business Process Model and Notation for Security Risk Management
    Altuhhova, Olga
    Matulevicius, Raimundas
    Ahmed, Naved
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2013, 4 (04) : 93 - 113
  • [43] Controlling usage in business process workflows through fine-grained security policies
    Aziz, Benjamin
    Arenas, Alvaro
    Martinelli, Fabio
    Matteucci, Ilaria
    Mori, Paolo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 100 - +