메뉴 건너뛰기




Volumn 6710 LNCS, Issue , 2011, Pages 194-209

InDico: Information flow analysis of business processes for confidentiality requirements

Author keywords

Business processes; compliance management; confidentiality requirements; information flow analysis

Indexed keywords

ACCESS CONTROL MECHANISM; AUTOMATED ANALYSIS; BUSINESS PROCESS; COMPLIANCE MANAGEMENT; CONFIDENTIALITY REQUIREMENTS; INFORMATION FLOW ANALYSIS; META MODEL;

EID: 80054075640     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22444-7_13     Document Type: Conference Paper
Times cited : (19)

References (32)
  • 1
    • 84876359591 scopus 로고    scopus 로고
    • Auditing workflow executions against dataflow policies
    • Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. Springer, Heidelberg
    • Accorsi, R., Wonnemann, C.: Auditing workflow executions against dataflow policies. In: Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. LNBIP, vol. 47, pp. 207-217. Springer, Heidelberg (2010)
    • (2010) LNBIP , vol.47 , pp. 207-217
    • Accorsi, R.1    Wonnemann, C.2
  • 2
    • 79959293472 scopus 로고    scopus 로고
    • Strong non-leak guarantees for workflow models
    • ACM, New York
    • Accorsi, R., Wonnemann, C.: Strong non-leak guarantees for workflow models. In: ACM Symposium on Applied Computing, pp. 308-314. ACM, New York (2011)
    • (2011) ACM Symposium on Applied Computing , pp. 308-314
    • Accorsi, R.1    Wonnemann, C.2
  • 4
    • 58049084581 scopus 로고    scopus 로고
    • Complying with compliance
    • Allman, E.: Complying with compliance. ACM Queue 4(7), 19-21 (2006)
    • (2006) ACM Queue , vol.4 , Issue.7 , pp. 19-21
    • Allman, E.1
  • 6
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. Springer, Heidelberg
    • Atluri, V., Huang, W.: An authorization model for workflows. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 44-64. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.2
  • 7
    • 0002539153 scopus 로고    scopus 로고
    • An extended Petri net model for supporting workflows in a multilevel secure environment
    • Chapman & Hall, Boca Raton
    • Atluri, V., Huang, W.: An extended Petri net model for supporting workflows in a multilevel secure environment. In: IFIP Conference Proceedings of Database Security, vol. 79, pp. 240-258. Chapman & Hall, Boca Raton (1996)
    • (1996) IFIP Conference Proceedings of Database Security , vol.79 , pp. 240-258
    • Atluri, V.1    Huang, W.2
  • 8
    • 70849107955 scopus 로고    scopus 로고
    • Verifying the interplay of authorization policies and workflow in service-oriented architectures
    • IEEE, Los Alamitos
    • Barletta, M., Ranise, S., Viganò, L.: Verifying the interplay of authorization policies and workflow in service-oriented architectures. In: Conference on Computational Science, vol. 3, pp. 289-296. IEEE, Los Alamitos (2009)
    • (2009) Conference on Computational Science , vol.3 , pp. 289-296
    • Barletta, M.1    Ranise, S.2    Viganò, L.3
  • 9
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • Breaux, T., Antón, A.: Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 34(1), 5-20 (2008)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.1    Antón, A.2
  • 11
    • 74049123448 scopus 로고    scopus 로고
    • Structural non-interference in elementary and trace nets
    • Busi, N., Gorrieri, R.: Structural non-interference in elementary and trace nets. Mathematical Structures in Computer Science 19(6), 1065-1090 (2009)
    • (2009) Mathematical Structures in Computer Science , vol.19 , Issue.6 , pp. 1065-1090
    • Busi, N.1    Gorrieri, R.2
  • 13
    • 84974776068 scopus 로고
    • A taxonomy of security properties for process algebras
    • Focardi, R., Gorrieri, R.: A taxonomy of security properties for process algebras. Journal of Computer Security 3(1), 5-34 (1995)
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-34
    • Focardi, R.1    Gorrieri, R.2
  • 14
    • 67650649695 scopus 로고    scopus 로고
    • Petri net security checker: Structural noninterference at work
    • Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. Springer, Heidelberg
    • Frau, S., Gorrieri, R., Ferigato, C.: Petri net security checker: Structural noninterference at work. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210-225. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5491 , pp. 210-225
    • Frau, S.1    Gorrieri, R.2    Ferigato, C.3
  • 15
    • 34047142082 scopus 로고    scopus 로고
    • The process audit
    • Hammer, M.: The process audit. Harvard Business Review 85(4), 119-142 (2007)
    • (2007) Harvard Business Review , vol.85 , Issue.4 , pp. 119-142
    • Hammer, M.1
  • 16
    • 0001604985 scopus 로고
    • Coloured Petri nets: A high level language for system design and analysis
    • Rozenberg, G. (ed.) APN 1990. Springer, Heidelberg
    • Jensen, K.: Coloured Petri nets: A high level language for system design and analysis. In: Rozenberg, G. (ed.) APN 1990. LNCS, vol. 483, pp. 342-416. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.483 , pp. 342-416
    • Jensen, K.1
  • 18
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson, B.: A note on the confinement problem. Communications of the ACM 16(10), 613-615 (1973)
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 19
    • 43149123380 scopus 로고    scopus 로고
    • A feature-complete petri net semantics for WS-BPEL 2.0
    • Dumas, M., Heckel, R. (eds.) WS-FM 2007. Springer, Heidelberg
    • Lohmann, N.: A feature-complete petri net semantics for WS-BPEL 2.0. In: Dumas, M., Heckel, R. (eds.) WS-FM 2007. LNCS, vol. 4937, pp. 77-91. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4937 , pp. 77-91
    • Lohmann, N.1
  • 20
    • 70349373797 scopus 로고    scopus 로고
    • Petri net transformations for business processes - A survey
    • Jensen, K., van der Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. Springer, Heidelberg
    • Lohmann, N., Verbeek, E., Dijkman, R.: Petri net transformations for business processes - A survey. In: Jensen, K., van der Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. LNCS, vol. 5460, pp. 46-63. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5460 , pp. 46-63
    • Lohmann, N.1    Verbeek, E.2    Dijkman, R.3
  • 22
    • 77951442815 scopus 로고    scopus 로고
    • Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten
    • Müller, G., Accorsi, R., Höhn, S., Sackmann, S.: Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Informatik Spektrum 33(1), 3-13 (2010)
    • (2010) Informatik Spektrum , vol.33 , Issue.1 , pp. 3-13
    • Müller, G.1    Accorsi, R.2    Höhn, S.3    Sackmann, S.4
  • 23
    • 38149023379 scopus 로고    scopus 로고
    • Using control patterns in business processes compliance
    • Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. Springer, Heidelberg
    • Namiri, K., Stojanovic, N.: Using control patterns in business processes compliance. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. LNCS, vol. 4832, pp. 178-190. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4832 , pp. 178-190
    • Namiri, K.1    Stojanovic, N.2
  • 28
    • 33847060397 scopus 로고    scopus 로고
    • Formulating the data-flow perspective for business process management
    • Sun, S., Zhao, L., Nunamaker, J., Sheng, O.L.: Formulating the data-flow perspective for business process management. Information Systems Research 17(4), 374-391 (2006)
    • (2006) Information Systems Research , vol.17 , Issue.4 , pp. 374-391
    • Sun, S.1    Zhao, L.2    Nunamaker, J.3    Sheng, O.L.4
  • 29
    • 69849089733 scopus 로고    scopus 로고
    • Data-flow anti-patterns: Discovering data-flow errors in workflows
    • van Eck, P., Gordijn, J., Wieringa, R. (eds.) CAiSE 2009. Springer, Heidelberg
    • Trčka, N., van der Aalst, W., Sidorova, N.: Data-flow anti-patterns: Discovering data-flow errors in workflows. In: van Eck, P., Gordijn, J., Wieringa, R. (eds.) CAiSE 2009. LNCS, vol. 5565, pp. 425-439. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5565 , pp. 425-439
    • Trčka, N.1    Van Der Aalst, W.2    Sidorova, N.3
  • 30
    • 38049066016 scopus 로고    scopus 로고
    • Satisfiability and resiliency in workflow systems
    • Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
    • Wang, Q., Li, N.: Satisfiability and resiliency in workflow systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 90-105. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 90-105
    • Wang, Q.1    Li, N.2
  • 31
    • 79960714048 scopus 로고    scopus 로고
    • The state of business process management
    • Wolf, C., Harmon, P.: The state of business process management. BPTrends Report (2010), http://www.bptrends.com/
    • (2010) BPTrends Report
    • Wolf, C.1    Harmon, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.