메뉴 건너뛰기




Volumn 5983 LNCS, Issue , 2010, Pages 66-80

Model checking of security-sensitive business processes

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; AUTHORIZATION CONSTRAINTS; AUTOMATIC ANALYSIS; BUSINESS PROCESS; ERROR PRONES; FORMAL MODEL; NEW APPROACHES; SECURITY POLICY; SECURITY REQUIREMENTS;

EID: 77953246991     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12459-4_6     Document Type: Conference Paper
Times cited : (30)

References (19)
  • 1
    • 33748067444 scopus 로고    scopus 로고
    • A model-checking approach to analysing organisational controls in a loan origination process
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: SACMAT, pp. 139-149. ACM, New York (2006) (Pubitemid 44300751)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 139-149
    • Schaad, A.1    Lotz, V.2    Sohr, K.3
  • 3
    • 47949104986 scopus 로고    scopus 로고
    • Formal verification of business workflows and role based access control systems
    • Dury, A., Boroday, S., Petrenko, A., Lotz, V.: Formal verification of business workflows and role based access control systems. In: SECURWARE 2007, pp. 201-210 (2007)
    • (2007) SECURWARE 2007 , pp. 201-210
    • Dury, A.1    Boroday, S.2    Petrenko, A.3    Lotz, V.4
  • 5
    • 22944445210 scopus 로고    scopus 로고
    • SATMC: A SAT-based model checker for security protocols
    • Alferes, J.J., Leite, J. (eds.) JELIA 2004. Springer, Heidelberg
    • Armando, A., Compagna, L.: SATMC: a SAT-based model checker for security protocols. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 730-733. Springer, Heidelberg (2004)
    • (2004) LNCS (LNAI) , vol.3229 , pp. 730-733
    • Armando, A.1    Compagna, L.2
  • 6
    • 77953249981 scopus 로고    scopus 로고
    • Sat-based model-checking for security protocols analysis
    • Springer Heidelberg
    • Armando, A., Compagna, L.: Sat-based model-checking for security protocols analysis. In: IJIS. Springer, Heidelberg (2007)
    • (2007) IJIS
    • Armando, A.1    Compagna, L.2
  • 9
    • 30644477677 scopus 로고    scopus 로고
    • Supporting conditional delegation in secure workflow management systems
    • ACM Press, New York
    • Atluri, V., Warner, J.: Supporting conditional delegation in secure workflow management systems. In: SACMAT, pp. 49-58. ACM Press, New York (2005)
    • (2005) SACMAT , pp. 49-58
    • Atluri, V.1    Warner, J.2
  • 10
    • 0031642569 scopus 로고    scopus 로고
    • An action language based on causal explanation: Preliminary report
    • AAAI Press, Menlo Park
    • Giunchiglia, E., Lifschitz, V.: An action language based on causal explanation: Preliminary report. In: AAAI 1998, pp. 623-630. AAAI Press, Menlo Park (1998)
    • (1998) AAAI 1998 , pp. 623-630
    • Giunchiglia, E.1    Lifschitz, V.2
  • 11
    • 84929881457 scopus 로고    scopus 로고
    • Planning as satisfiability in nondeterministic domains
    • AAAI Press / The MIT Press
    • Ferraris, P., Giunchiglia, E.: Planning as satisfiability in nondeterministic domains. In: AAAI 2000 and IAAI 2000, pp. 748-753. AAAI Press / The MIT Press (2000)
    • (2000) AAAI 2000 and IAAI 2000 , pp. 748-753
    • Ferraris, P.1    Giunchiglia, E.2
  • 14
    • 35048868416 scopus 로고    scopus 로고
    • LTL model checking for security protocols
    • IEEE Computer Society, Los Alamitos
    • Armando, A., Carbone, R., Compagna, L.: LTL model checking for security protocols. In: CSF-20, pp. 385-396. IEEE Computer Society, Los Alamitos (2007)
    • (2007) CSF-20 , pp. 385-396
    • Armando, A.1    Carbone, R.2    Compagna, L.3
  • 15
    • 70349233792 scopus 로고    scopus 로고
    • Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for google apps
    • ACM, New York
    • Armando, A., Carbone, R., Compagna, L., Cuéllar, J., Tobarra, M.L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. In: FMSE, pp. 1-10. ACM, New York (2008)
    • (2008) FMSE , pp. 1-10
    • Armando, A.1    Carbone, R.2    Compagna, L.3    Cuéllar, J.4    Tobarra, M.L.5
  • 16
    • 0001793083 scopus 로고    scopus 로고
    • Encoding Plans in Propositional Logic
    • Kautz, H., McAllester, H., Selman, B.: Encoding Plans in Propositional Logic. In: KR, pp. 374-384 (1996)
    • (1996) KR , pp. 374-384
    • Kautz, H.1    McAllester, H.2    Selman, B.3
  • 17
    • 70350635706 scopus 로고    scopus 로고
    • Verification of business process entailment constraints using SPIN
    • Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. Springer, Heidelberg
    • Wolter, C., Miseldine, P., Meinel, C.: Verification of business process entailment constraints using SPIN. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5429
    • Wolter, C.1    Miseldine, P.2    Meinel, C.3
  • 18
    • 35048849152 scopus 로고    scopus 로고
    • Model-checking access control policies
    • Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
    • Guelev, D.P., Ryan, M., Schobbens, P.Y.: Model-checking access control policies. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 219-230. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3225 , pp. 219-230
    • Guelev, D.P.1    Ryan, M.2    Schobbens, P.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.