메뉴 건너뛰기




Volumn 2678, Issue , 2003, Pages 168-183

Security in business process engineering

Author keywords

Design; Security in Business Process Modeling; Verification and Validation

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; CRYPTOGRAPHY; DESIGN; ENTERPRISE RESOURCE MANAGEMENT; PETRI NETS; PROCESS ENGINEERING; SPECIFICATIONS; SYSTEMS ENGINEERING;

EID: 33644553339     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44895-0_12     Document Type: Article
Times cited : (32)

References (29)
  • 2
    • 35248899328 scopus 로고    scopus 로고
    • Cryptographically sound and machine-assisted verification of security protocols
    • Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), 2607 Springer
    • M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2607 of Lecture Notes in Computer Science, pages 675-686. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , pp. 675-686
    • Backes, M.1    Jacobi, C.2
  • 3
    • 84937407919 scopus 로고    scopus 로고
    • Deriving Cryptographically sound implementations using composition and formally verified bisimulation
    • Proc. 11th Symposium on Formal Methods Europe (FME 2002), Springer, 2002
    • M. Backes, C. Jacobi, and B. Pfitzmann. Deriving Cryptographically sound implementations using composition and formally verified bisimulation. In Proc. 11th Symposium on Formal Methods Europe (FME 2002), volume 2391 of Lecture Notes in Computer Science, pages 310-329. Springer, 2002.
    • Lecture Notes in Computer Science , vol.2391 , pp. 310-329
    • Backes, M.1    Jacobi, C.2    Pfitzmann, B.3
  • 4
    • 84957037045 scopus 로고    scopus 로고
    • Computational probabilistic non-interference
    • Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
    • M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 1-23. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2502 , pp. 1-23
    • Backes, M.1    Pfitzmann, B.2
  • 12
    • 0003843704 scopus 로고
    • Communicating Sequential Processes
    • Prentice Hall, Kernel Hempstead
    • C. A. R. Hoare. Communicating Sequential Processes. International Series in Computer Science, Prentice Hall, Kernel Hempstead, 1985.
    • (1985) International Series in Computer Science
    • Hoare, C.A.R.1
  • 13
    • 84948160653 scopus 로고    scopus 로고
    • Model checking for managers
    • Proc. Theoretical and Practical Aspects of SPIN Model Checking, Springer
    • W. Janssen, R. Mateescu, S. Mauw, P. Fennema, and P. van der Stappen. Model checking for managers. In Proc. Theoretical and Practical Aspects of SPIN Model Checking, volume 1680 of Lecture Notes in Computer Science, pages 92-107. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1680 , pp. 92-107
    • Janssen, W.1    Mateescu, R.2    Mauw, S.3    Fennema, P.4    Van Der Stappen, P.5
  • 15
    • 84957689522 scopus 로고    scopus 로고
    • A temporal logic for events and states
    • Proc. 19th International Conference on Application and Theory of Petri Nets, Springer
    • E. Kindler and T. Vesper. A temporal logic for events and states. In Proc. 19th International Conference on Application and Theory of Petri Nets, volume 1420 of Lecture Notes in Computer Science, pages 365-384. Springer, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1420 , pp. 365-384
    • Kindler, E.1    Vesper, T.2
  • 19
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • Proc. 5th International Conference on the Unified Modeling Language, Springer
    • T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In Proc. 5th International Conference on the Unified Modeling Language, volume 2460 of Lecture Notes in Computer Science, pages 425-441. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 425-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Springer
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 0004215089 scopus 로고    scopus 로고
    • Morgan Kaufmann Publishers, San Francisco
    • N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, 1996.
    • (1996) Distributed Algorithms
    • Lynch, N.1
  • 23
    • 84944677742 scopus 로고
    • PVS: A prototype verification system
    • Proc. 11th International Conference on Automated Deduction (CADE), springer
    • S. Owre, N. Shankar, and J. M. Rushby. PVS: A prototype verification system. In Proc. 11th International Conference on Automated Deduction (CADE), volume 607 of Lecture Notes in Computer Science, pages 748-752. springer, 1992.
    • (1992) Lecture Notes in Computer Science , vol.607 , pp. 748-752
    • Owre, S.1    Shankar, N.2    Rushby, J.M.3
  • 24
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
    • (1998) Journal of Cryptology , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1
  • 25
    • 0005076119 scopus 로고    scopus 로고
    • Cryptographic security of reactive systems
    • Electronic Notes in Theoretical Computer Science (ENTCS), March
    • B. Pfitzmann, M. Schunter, and M. Waidner. Cryptographic security of reactive systems. Presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), March 2000. http://www.elsevier.nl/cas/tree/store/tcs/free/noncas/pc/menu.htm.
    • (2000) DERA/RHUL Workshop on Secure Architectures and Information Flow
    • Pfitzmann, B.1    Schunter, M.2    Waidner, M.3
  • 26
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
    • (2001) Proc. 22nd IEEE Symposium on Security & Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 28
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A. W. Roscoe and P. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal of Computer Security, 7(2,3):147-190, 1998.
    • (1998) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.