메뉴 건너뛰기




Volumn 7481 LNCS, Issue , 2012, Pages 172-187

Automatic information flow analysis of business process models

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC INFORMATION; BUSINESS PROCESS MODEL; INDUSTRIAL PROCESSS; INFORMATION FLOW ANALYSIS; INFORMATION FLOW CONTROL; MODEL-CHECKING ALGORITHMS; NON INTERFERENCE; PROCESS MODEL; REACHABILITY; STATE OF THE ART;

EID: 84866391692     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32885-5_13     Document Type: Conference Paper
Times cited : (34)

References (38)
  • 2
    • 84856273290 scopus 로고    scopus 로고
    • Automated certification for compliant cloud-based business processes
    • Accorsi, R., Lowis, L., Sato, Y.: Automated certification for compliant cloud-based business processes. Bus. & Information Systems Eng. 3(3), 145-154 (2011)
    • (2011) Bus. & Information Systems Eng. , vol.3 , Issue.3 , pp. 145-154
    • Accorsi, R.1    Lowis, L.2    Sato, Y.3
  • 4
    • 80054075640 scopus 로고    scopus 로고
    • InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements
    • Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. Springer, Heidelberg
    • Accorsi, R., Wonnemann, C.: InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 194-209. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6710 , pp. 194-209
    • Accorsi, R.1    Wonnemann, C.2
  • 8
    • 84861031279 scopus 로고    scopus 로고
    • Automated Analysis of Infinite State Workflows with Access Control Policies
    • Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. Springer, Heidelberg
    • Armando, A., Ranise, S.: Automated Analysis of Infinite State Workflows with Access Control Policies. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 157-174. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7170 , pp. 157-174
    • Armando, A.1    Ranise, S.2
  • 14
    • 74049123448 scopus 로고    scopus 로고
    • Structural non-interference in elementary and trace nets
    • Busi, N., Gorrieri, R.: Structural non-interference in elementary and trace nets. Mathematical Structures in Computer Science 19(6), 1065-1090 (2009)
    • (2009) Mathematical Structures in Computer Science , vol.19 , Issue.6 , pp. 1065-1090
    • Busi, N.1    Gorrieri, R.2
  • 15
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D.E.: A lattice model of secure information flow. Communications of the ACM 19(5), 236-243 (1976)
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 16
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM 20(7), 504-513 (1977)
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 17
    • 79955656399 scopus 로고    scopus 로고
    • Analysis on demand: Instantaneous soundness checking of industrial business process models
    • Fahland, D., Favre, C., Koehler, J., Lohmann, N., Völzer, H., Wolf, K.: Analysis on demand: Instantaneous soundness checking of industrial business process models. Data Knowl. Eng. 70(5), 448-466 (2011)
    • (2011) Data Knowl. Eng. , vol.70 , Issue.5 , pp. 448-466
    • Fahland, D.1    Favre, C.2    Koehler, J.3    Lohmann, N.4    Völzer, H.5    Wolf, K.6
  • 18
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties
    • Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. Springer, Heidelberg
    • Focardi, R., Gorrieri, R.: Classification of Security Properties. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331-396. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 19
    • 67650649695 scopus 로고    scopus 로고
    • Petri Net Security Checker: Structural Noninterference at Work
    • Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. Springer, Heidelberg
    • Frau, S., Gorrieri, R., Ferigato, C.: Petri Net Security Checker: Structural Noninterference at Work. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210-225. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5491 , pp. 210-225
    • Frau, S.1    Gorrieri, R.2    Ferigato, C.3
  • 20
    • 84857723938 scopus 로고    scopus 로고
    • On Intransitive Non-interference in Some Models of Concurrency
    • Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. Springer, Heidelberg
    • Gorrieri, R., Vernali, M.: On Intransitive Non-interference in Some Models of Concurrency. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 125-151. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6858 , pp. 125-151
    • Gorrieri, R.1    Vernali, M.2
  • 21
    • 70649112133 scopus 로고    scopus 로고
    • Verifying Information Flow Control over Unbounded Processes
    • Cavalcanti, A., Dams, D.R. (eds.) FM 2009. Springer, Heidelberg
    • Harris, W., Kidd, N., Chaki, S., Jha, S., Reps, T.W.: Verifying Information Flow Control over Unbounded Processes. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 773-789. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5850 , pp. 773-789
    • Harris, W.1    Kidd, N.2    Chaki, S.3    Jha, S.4    Reps, T.W.5
  • 22
    • 80052886058 scopus 로고    scopus 로고
    • Formal specification and verification of modular security policy based on colored Petri nets
    • Huang, H., Kirchner, H.: Formal specification and verification of modular security policy based on colored Petri nets. IEEE Trans. Dependable Sec. Comput. 8(6), 852-865 (2011)
    • (2011) IEEE Trans. Dependable Sec. Comput. , vol.8 , Issue.6 , pp. 852-865
    • Huang, H.1    Kirchner, H.2
  • 24
    • 84944400741 scopus 로고    scopus 로고
    • Verifying enterprise's mandatory access control policies with coloured Petri nets
    • IEEE
    • Juszczyszyn, K.: Verifying enterprise's mandatory access control policies with coloured Petri nets. In: Enabling Technologies, pp. 184-189. IEEE (2003)
    • (2003) Enabling Technologies , pp. 184-189
    • Juszczyszyn, K.1
  • 25
    • 78650703724 scopus 로고    scopus 로고
    • Towards a Usage Control Policy Specification with Petri Nets
    • Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part II. Springer, Heidelberg
    • Katt, B., Zhang, X., Hafner, M.: Towards a Usage Control Policy Specification with Petri Nets. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part II. LNCS, vol. 5871, pp. 905-912. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5871 , pp. 905-912
    • Katt, B.1    Zhang, X.2    Hafner, M.3
  • 26
    • 84857260231 scopus 로고    scopus 로고
    • Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    • Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. Springer, Heidelberg
    • Kovács, M., Seidl, H.: Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 46-59. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7159 , pp. 46-59
    • Kovács, M.1    Seidl, H.2
  • 28
    • 70349373797 scopus 로고    scopus 로고
    • Petri Net Transformations for Business Processes - A Survey
    • Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. Springer, Heidelberg
    • Lohmann, N., Verbeek, E., Dijkman, R.: Petri Net Transformations for Business Processes - A Survey. In: Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. LNCS, vol. 5460, pp. 46-63. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5460 , pp. 46-63
    • Lohmann, N.1    Verbeek, E.2    Dijkman, R.3
  • 29
    • 78049296490 scopus 로고    scopus 로고
    • How to Implement a Theory of Correctness in the Area of Business Processes and Services
    • Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. Springer, Heidelberg
    • Lohmann, N., Wolf, K.: How to Implement a Theory of Correctness in the Area of Business Processes and Services. In: Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. LNCS, vol. 6336, pp. 61-77. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6336 , pp. 61-77
    • Lohmann, N.1    Wolf, K.2
  • 30
    • 81455142699 scopus 로고    scopus 로고
    • Vulnerability analysis in SOA-based business processes
    • Lowis, L., Accorsi, R.: Vulnerability analysis in SOA-based business processes. IEEE T. Services Computing 4(3), 230-242 (2011)
    • (2011) IEEE T. Services Computing , vol.4 , Issue.3 , pp. 230-242
    • Lowis, L.1    Accorsi, R.2
  • 31
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis and applications
    • Murata, T.: Petri nets: Properties, analysis and applications. Proc. IEEE 77(4), 541-580 (1989)
    • (1989) Proc. IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 33
    • 64249086031 scopus 로고    scopus 로고
    • Security analysis of electronic business processes
    • Röhrig, S., Knorr, K.: Security analysis of electronic business processes. Electronic Commerce Research 4(1-2), 59-81 (2004)
    • (2004) Electronic Commerce Research , vol.4 , Issue.1-2 , pp. 59-81
    • Röhrig, S.1    Knorr, K.2
  • 37
    • 38149062061 scopus 로고    scopus 로고
    • Generating Petri Net State Spaces
    • Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. Springer, Heidelberg
    • Wolf, K.: Generating Petri Net State Spaces. In: Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. LNCS, vol. 4546, pp. 29-42. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4546 , pp. 29-42
    • Wolf, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.