메뉴 건너뛰기




Volumn 7170 LNCS, Issue , 2012, Pages 157-174

Automated analysis of infinite state workflows with access control policies

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; ANALYSIS PROBLEMS; ARBITRARY NUMBER; AUTHORIZATION CONSTRAINTS; AUTOMATED ANALYSIS; AUTOMATED TECHNIQUES; BUSINESS PROCESS; INFINITE STATE; MODEL CHECKING PROBLEM; WORK-FLOW SYSTEMS; WORK-FLOWS;

EID: 84861031279     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29963-6_12     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 5
    • 80054066184 scopus 로고    scopus 로고
    • Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, Springer, Heidelberg
    • Armando, A., Ranise, S.: Automated Symbolic Analysis of ARBAC Policies. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 17-34. Springer, Heidelberg (2011
    • (2011) Automated Symbolic Analysis of ARBAC Policies , vol.6710 , pp. 17-34
    • Armando, A.1    Ranise, S.2
  • 6
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 65-104 (1999
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 33750027244 scopus 로고    scopus 로고
    • Modelling and resource allocation planning of BPEL workflows under security constraints
    • Cerone, A., Xiangpeng, Z., Krishnan, P.: Modelling and resource allocation planning of BPEL workflows under security constraints. Technical Report 336, UNU-IIST (2006
    • (2006) Technical Report 336, UNU-IIST
    • Cerone, A.1    Xiangpeng, Z.2    Krishnan, P.3
  • 9
    • 30644475116 scopus 로고    scopus 로고
    • A reference monitor for workflow systems with constrained task execution
    • DOI 10.1145/1063979.1063986, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
    • Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: 10th ACM SACMAT, pp. 38-47. ACM (2005 (Pubitemid 43087459)
    • (2005) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 38-47
    • Crampton, J.1
  • 10
    • 47949104986 scopus 로고    scopus 로고
    • Formal verification of business workflows and role based access control systems
    • Dury, A., Boroday, S., Petrenko, A., Lotz, V.: Formal verification of business workflows and role based access control systems. In: SECURWARE, pp. 201-2010 (2007
    • (2007) SECURWARE , pp. 201-2010
    • Dury, A.1    Boroday, S.2    Petrenko, A.3    Lotz, V.4
  • 12
    • 84959051487 scopus 로고    scopus 로고
    • Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, Springer, Heidelberg
    • Fu, X., Bultan, T., Su, J.: Formal Verification of E-Services and Workflows. In: Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, vol. 2512, pp. 188-202. Springer, Heidelberg (2002
    • (2002) Formal Verification of E-Services and Workflows , vol.2512 , pp. 188-202
    • Fu, X.1    Bultan, T.2    Su, J.3
  • 13
    • 79951864962 scopus 로고    scopus 로고
    • Backward reachability of array-based systems by smt solving: Termination and invariant synthesis
    • Ghilardi, S., Ranise, S.: Backward reachability of array-based systems by smt solving: Termination and invariant synthesis. In: LMCS, vol. 6(4) (2010
    • (2010) LMCS , vol.6 , Issue.4
    • Ghilardi, S.1    Ranise, S.2
  • 17
    • 33845517298 scopus 로고    scopus 로고
    • Security analysis in role-based access control
    • DOI 10.1145/1187441.1187442
    • Li, N., Tripunitara, M.V.: Security analysis in role-based access control. ACM Transactions on Information and System Security (TISSEC) 9(4), 391-420 (2006 (Pubitemid 44927156)
    • (2006) ACM Transactions on Information and System Security , vol.9 , Issue.4 , pp. 391-420
    • Li, N.1    Tripunitara, M.V.2
  • 21
  • 23
    • 78651384017 scopus 로고    scopus 로고
    • Satisfiability and resiliency in workflow authorization systems
    • Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13, 40:1-40:35 (2010
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , pp. 401-4035
    • Wang, Q.1    Li, N.2
  • 24


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.