메뉴 건너뛰기




Volumn 5429 LNCS, Issue , 2009, Pages 1-15

Verification of business process entailment constraints using SPIN

Author keywords

Access Control; Model Checking; Processes; SPIN; Verification

Indexed keywords

ABSTRACTION LEVEL; AUTOMATED TECHNIQUES; AUTOMATIC TRANSLATION; BUSINESS PROCESS; BUSINESS PROCESS MODEL; COLOURED PETRI NETS; FINITE STATE MACHINES; META LANGUAGE; MODEL CHECKER; MODELLING TOOLS; PLUG-INS; PROCESS MODEL; PROCESSES; PROMELA; PROOF OF CONCEPT; SECURE SYSTEM; SPIN; TECHNICAL DETAILS; VISUAL FEEDBACK;

EID: 70350635706     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00199-4_1     Document Type: Conference Paper
Times cited : (24)

References (36)
  • 1
    • 11144352941 scopus 로고    scopus 로고
    • Organizational Management in Workflow Applications-Issues and Perspectives
    • Zur Muehlen, M.: Organizational Management in Workflow Applications-Issues and Perspectives. Inf. Technol. and Management 5(3-4), 271-291 (2004)
    • (2004) Inf. Technol. and Management , vol.5 , Issue.3-4 , pp. 271-291
    • Zur Muehlen, M.1
  • 4
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • Oh, S., Park, S.: Task-role-based access control model. Inf. Syst. 28(6), 533-562 (2003)
    • (2003) Inf. Syst , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 10
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • IEEE Computer Society Press, Los Alamitos
    • Saltzer, J.H., Schroeder, M.D.: The Protection of Information in Computer Systems. In: Proc. IEEE, vol. 63, pp. 1278-1308. IEEE Computer Society Press, Los Alamitos (1975)
    • (1975) Proc. IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 11
    • 4944250730 scopus 로고    scopus 로고
    • Tan, K., Crampton, J., Gunter, C.A.: The Consistency of Task-Based Authorization Constraints in Workflow Systems. In: CSFW, p. 155- (2004)
    • Tan, K., Crampton, J., Gunter, C.A.: The Consistency of Task-Based Authorization Constraints in Workflow Systems. In: CSFW, p. 155- (2004)
  • 12
    • 38049066016 scopus 로고    scopus 로고
    • Satisfiability and Resiliency in Workflow Systems
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Wang, Q., Li, N.: Satisfiability and Resiliency in Workflow Systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 90-105. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 90-105
    • Wang, Q.1    Li, N.2
  • 13
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 15
    • 34247861351 scopus 로고    scopus 로고
    • A static compliance-checking framework for business process models
    • Liu, Y., Mueller, S., Xu, K.: A static compliance-checking framework for business process models. IBM Syst. J. 46(2), 335-361 (2007)
    • (2007) IBM Syst. J , vol.46 , Issue.2 , pp. 335-361
    • Liu, Y.1    Mueller, S.2    Xu, K.3
  • 16
    • 57049136576 scopus 로고    scopus 로고
    • Awad, A., Decker, G.,Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, 5240, pp. 326-341. Springer, Heidelberg (2008)
    • Awad, A., Decker, G.,Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 326-341. Springer, Heidelberg (2008)
  • 19
    • 25144499038 scopus 로고    scopus 로고
    • Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, O., Falcao e Cunha, J. (eds.) CAiSE 2005. LNCS, 3520, pp. 216-232. Springer, Heidelberg (2005)
    • Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, O., Falcao e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216-232. Springer, Heidelberg (2005)
  • 20
    • 33750014264 scopus 로고    scopus 로고
    • Wohed, P., van der Aalst, W.M.P., Dumas, M., ter Hofstede, A.H.M., Russell, N.: On the Suitability of BPMN for Business Process Modelling. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, 4102, pp. 161-176. Springer, Heidelberg (2006)
    • Wohed, P., van der Aalst, W.M.P., Dumas, M., ter Hofstede, A.H.M., Russell, N.: On the Suitability of BPMN for Business Process Modelling. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 161-176. Springer, Heidelberg (2006)
  • 21
    • 0034810791 scopus 로고    scopus 로고
    • Separation of Duties for Access Control Enforcement inWorkflow Environments
    • Botha, R.A., Eloff, J.H.P.: Separation of Duties for Access Control Enforcement inWorkflow Environments. IBM System Journal 40(3), 666-682 (2001)
    • (2001) IBM System Journal , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 22
    • 38049132539 scopus 로고    scopus 로고
    • Wolter, C., Schaad, A.: Modelling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, 4714, pp. 64-79. Springer, Heidelberg (2007)
    • Wolter, C., Schaad, A.: Modelling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64-79. Springer, Heidelberg (2007)
  • 23
    • 38049150939 scopus 로고    scopus 로고
    • Sadiq,W.S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, 4714, pp. 149-164. Springer, Heidelberg (2007)
    • Sadiq,W.S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149-164. Springer, Heidelberg (2007)
  • 24
    • 44849127247 scopus 로고    scopus 로고
    • Lectures on Concurrency and Petri Nets
    • Desel, J, Reisig, W, Rozenberg, G, eds, Springer, Heidelberg
    • Desel, J., Reisig, W., Rozenberg, G. (eds.): Lectures on Concurrency and Petri Nets. LNCS, vol. 3098. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3098
  • 25
    • 38349016157 scopus 로고    scopus 로고
    • Formal semantics and analysis of bpmn process models
    • Technical report, Queensland University of Technology
    • Dijkman, R.M., Dumas, M., Ouyang, C.: Formal semantics and analysis of bpmn process models. Technical report, Queensland University of Technology (2007)
    • (2007)
    • Dijkman, R.M.1    Dumas, M.2    Ouyang, C.3
  • 29
    • 30844469504 scopus 로고    scopus 로고
    • Nakajima, Shin: Lightweight formal analysis of Web service flows. Progress in informatics: PI 2, 57-76 (2005)
    • Nakajima, Shin: Lightweight formal analysis of Web service flows. Progress in informatics: PI 2, 57-76 (2005)
  • 32
    • 33644505764 scopus 로고    scopus 로고
    • Fisteus, J.A., Fernandez, L.S., Kloos, C.D.: Applying model checking to BPEL4WS business collaborations. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 826-830. Springer, Heidelberg (2006)
    • Fisteus, J.A., Fernandez, L.S., Kloos, C.D.: Applying model checking to BPEL4WS business collaborations. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 826-830. Springer, Heidelberg (2006)
  • 33
    • 33749984776 scopus 로고    scopus 로고
    • Xiangpeng, Z., Cerone, A., Krishnan, P.: Verifying BPEL Workflows Under Authorisation Constraints. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, 4102, pp. 439-444. Springer, Heidelberg (2006)
    • Xiangpeng, Z., Cerone, A., Krishnan, P.: Verifying BPEL Workflows Under Authorisation Constraints. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 439-444. Springer, Heidelberg (2006)
  • 34
    • 70350684888 scopus 로고    scopus 로고
    • Model-based Testing of Access Control Systems that Employ RBAC Policies
    • BPM, Springer, Heidelberg
    • Masood, A., Bhatti, R., Ghafoor, A., Mathur, A.: Model-based Testing of Access Control Systems that Employ RBAC Policies. In: BPM 2006. LNCS, pp. 439-444. Springer, Heidelberg (2006)
    • (2006) LNCS , pp. 439-444
    • Masood, A.1    Bhatti, R.2    Ghafoor, A.3    Mathur, A.4
  • 35
    • 70350693722 scopus 로고    scopus 로고
    • Huang, W.-k., Atluri, V.: SecureFlow: A Secure Web-Enabled Workflow Management System. In: ACM Workshop on Role-Based Access Control, pp. 83-94 (1999)
    • Huang, W.-k., Atluri, V.: SecureFlow: A Secure Web-Enabled Workflow Management System. In: ACM Workshop on Role-Based Access Control, pp. 83-94 (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.