메뉴 건너뛰기




Volumn 6542 LNCS, Issue , 2011, Pages 29-42

Security validation of business processes via model-checking

Author keywords

[No Author keywords available]

Indexed keywords

ART MODEL; AUTOMATED REASONING; BUSINESS ANALYSTS; BUSINESS PROCESS; DYNAMIC ENVIRONMENTS; INDUSTRIAL ACTIVITIES; INDUSTRIAL SYSTEMS; RUNTIME ENVIRONMENTS; TASK DELEGATION; TOOL SUPPORT; VALIDATION APPROACH;

EID: 79551564021     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19125-1_3     Document Type: Conference Paper
Times cited : (41)

References (14)
  • 2
  • 4
    • 27644537252 scopus 로고    scopus 로고
    • Modeling security requirements through ownership, permission and delegation
    • IEEE Press, Los Alamitos
    • Giorgini, P., Massacci, F., Mylopoulos, J.: Modeling security requirements through ownership, permission and delegation. In: RE, pp. 167-176. IEEE Press, Los Alamitos (2005)
    • (2005) RE , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 7
    • 33748067444 scopus 로고    scopus 로고
    • A model-checking approach to analysing organisational controls in a loan origination process
    • ACM, New York
    • Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: SACMAT, pp. 139-149. ACM, New York (2006)
    • (2006) SACMAT , pp. 139-149
    • Schaad, A.1    Lotz, V.2    Sohr, K.3
  • 8
    • 70350635706 scopus 로고    scopus 로고
    • Verification of business process entailment constraints using SPIN
    • Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. Springer, Heidelberg
    • Wolter, C., Miseldine, P., Meinel, C.: Verification of business process entailment constraints using SPIN. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429, pp. 1-15. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5429 , pp. 1-15
    • Wolter, C.1    Miseldine, P.2    Meinel, C.3
  • 10
    • 33645964601 scopus 로고    scopus 로고
    • Evaluating access control policies through model checking
    • Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
    • Zhang, N., Ryan, M., Guelev, D.P.: Evaluating access control policies through model checking. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 446-460. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3650 , pp. 446-460
    • Zhang, N.1    Ryan, M.2    Guelev, D.P.3
  • 11
    • 0038613723 scopus 로고    scopus 로고
    • Workflow analyzed for security and privacy in using databases
    • Teepe, W., van de Riet, R., Olivier, M.: Workflow analyzed for security and privacy in using databases. J. Comput. Secur. 11(3), 353-363 (2003)
    • (2003) J. Comput. Secur. , vol.11 , Issue.3 , pp. 353-363
    • Teepe, W.1    Van De Riet, R.2    Olivier, M.3
  • 12
    • 79551542513 scopus 로고    scopus 로고
    • Specification, verification and explanation of violation for data aware compliance rules
    • Awad, A., Weidlich, M., Weske, M.: Specification, verification and explanation of violation for data aware compliance rules. In: ICSOC-Service Wave (2009)
    • (2009) ICSOC-Service Wave
    • Awad, A.1    Weidlich, M.2    Weske, M.3
  • 14
    • 57349158625 scopus 로고    scopus 로고
    • Rubacon: Automated support for model-based compliance engineering
    • Höhn, S., Jürjens, J.: Rubacon: automated support for model-based compliance engineering. In: ICSE, pp. 875-878 (2008)
    • (2008) ICSE , pp. 875-878
    • Höhn, S.1    Jürjens, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.