-
2
-
-
84856273290
-
Automated certification for compliant cloud-based business processes
-
Accorsi, R., Lowis, L., Sato, Y.: Automated certification for compliant cloud-based business processes. Bus. & Information Systems Eng. 3(3), 145-154 (2011)
-
(2011)
Bus. & Information Systems Eng.
, vol.3
, Issue.3
, pp. 145-154
-
-
Accorsi, R.1
Lowis, L.2
Sato, Y.3
-
4
-
-
80054075640
-
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements
-
Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. Springer, Heidelberg
-
Accorsi, R., Wonnemann, C.: InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 194-209. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6710
, pp. 194-209
-
-
Accorsi, R.1
Wonnemann, C.2
-
5
-
-
80455144533
-
SWAT: A security workflow toolkit for reliably secure process-aware information systems
-
IEEE
-
Accorsi, R., Wonnemann, C., Dochow, S.: SWAT: A security workflow toolkit for reliably secure process-aware information systems. In: Conference on Availability, Reliability and Security, pp. 692-697. IEEE (2011)
-
(2011)
Conference on Availability, Reliability and Security
, pp. 692-697
-
-
Accorsi, R.1
Wonnemann, C.2
Dochow, S.3
-
6
-
-
79960722523
-
Towards forensic data flow analysis of business process logs
-
IEEE
-
Accorsi, R., Wonnemann, C., Stocker, T.: Towards forensic data flow analysis of business process logs. In: Incident Management and Forensics, pp. 94-110. IEEE (2011)
-
(2011)
Incident Management and Forensics
, pp. 94-110
-
-
Accorsi, R.1
Wonnemann, C.2
Stocker, T.3
-
8
-
-
84861031279
-
Automated Analysis of Infinite State Workflows with Access Control Policies
-
Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. Springer, Heidelberg
-
Armando, A., Ranise, S.: Automated Analysis of Infinite State Workflows with Access Control Policies. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 157-174. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7170
, pp. 157-174
-
-
Armando, A.1
Ranise, S.2
-
9
-
-
0035750945
-
A Chinese Wall security model for decentralized workflow systems
-
ACM
-
Atluri, V., Chun, S.A., Mazzoleni, P.: A Chinese Wall security model for decentralized workflow systems. In: ACM Computer & Communication Security, pp. 48-57. ACM (2001)
-
(2001)
ACM Computer & Communication Security
, pp. 48-57
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
11
-
-
34249781371
-
Secured information flow for asynchronous sequential processes
-
Attali, I., Caromel, D., Henrio, L., Aguila, F.: Secured information flow for asynchronous sequential processes. Electr. Notes Theor. Comput. Sci. 180(1), 17-34 (2007)
-
(2007)
Electr. Notes Theor. Comput. Sci.
, vol.180
, Issue.1
, pp. 17-34
-
-
Attali, I.1
Caromel, D.2
Henrio, L.3
Aguila, F.4
-
12
-
-
63249084376
-
Verification of workflow processes under multilevel security considerations
-
IEEE
-
Barkaoui, K., Ayed, R.B., Boucheneb, H., Hicheur, A.: Verification of workflow processes under multilevel security considerations. In: Risks and Security of Internet and Systems, pp. 77-84. IEEE (2008)
-
(2008)
Risks and Security of Internet and Systems
, pp. 77-84
-
-
Barkaoui, K.1
Ayed, R.B.2
Boucheneb, H.3
Hicheur, A.4
-
14
-
-
74049123448
-
Structural non-interference in elementary and trace nets
-
Busi, N., Gorrieri, R.: Structural non-interference in elementary and trace nets. Mathematical Structures in Computer Science 19(6), 1065-1090 (2009)
-
(2009)
Mathematical Structures in Computer Science
, vol.19
, Issue.6
, pp. 1065-1090
-
-
Busi, N.1
Gorrieri, R.2
-
15
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.E.: A lattice model of secure information flow. Communications of the ACM 19(5), 236-243 (1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
16
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM 20(7), 504-513 (1977)
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
17
-
-
79955656399
-
Analysis on demand: Instantaneous soundness checking of industrial business process models
-
Fahland, D., Favre, C., Koehler, J., Lohmann, N., Völzer, H., Wolf, K.: Analysis on demand: Instantaneous soundness checking of industrial business process models. Data Knowl. Eng. 70(5), 448-466 (2011)
-
(2011)
Data Knowl. Eng.
, vol.70
, Issue.5
, pp. 448-466
-
-
Fahland, D.1
Favre, C.2
Koehler, J.3
Lohmann, N.4
Völzer, H.5
Wolf, K.6
-
18
-
-
84988393004
-
Classification of Security Properties
-
Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. Springer, Heidelberg
-
Focardi, R., Gorrieri, R.: Classification of Security Properties. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331-396. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
19
-
-
67650649695
-
Petri Net Security Checker: Structural Noninterference at Work
-
Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. Springer, Heidelberg
-
Frau, S., Gorrieri, R., Ferigato, C.: Petri Net Security Checker: Structural Noninterference at Work. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210-225. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5491
, pp. 210-225
-
-
Frau, S.1
Gorrieri, R.2
Ferigato, C.3
-
20
-
-
84857723938
-
On Intransitive Non-interference in Some Models of Concurrency
-
Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. Springer, Heidelberg
-
Gorrieri, R., Vernali, M.: On Intransitive Non-interference in Some Models of Concurrency. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 125-151. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6858
, pp. 125-151
-
-
Gorrieri, R.1
Vernali, M.2
-
21
-
-
70649112133
-
Verifying Information Flow Control over Unbounded Processes
-
Cavalcanti, A., Dams, D.R. (eds.) FM 2009. Springer, Heidelberg
-
Harris, W., Kidd, N., Chaki, S., Jha, S., Reps, T.W.: Verifying Information Flow Control over Unbounded Processes. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 773-789. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5850
, pp. 773-789
-
-
Harris, W.1
Kidd, N.2
Chaki, S.3
Jha, S.4
Reps, T.W.5
-
22
-
-
80052886058
-
Formal specification and verification of modular security policy based on colored Petri nets
-
Huang, H., Kirchner, H.: Formal specification and verification of modular security policy based on colored Petri nets. IEEE Trans. Dependable Sec. Comput. 8(6), 852-865 (2011)
-
(2011)
IEEE Trans. Dependable Sec. Comput.
, vol.8
, Issue.6
, pp. 852-865
-
-
Huang, H.1
Kirchner, H.2
-
24
-
-
84944400741
-
Verifying enterprise's mandatory access control policies with coloured Petri nets
-
IEEE
-
Juszczyszyn, K.: Verifying enterprise's mandatory access control policies with coloured Petri nets. In: Enabling Technologies, pp. 184-189. IEEE (2003)
-
(2003)
Enabling Technologies
, pp. 184-189
-
-
Juszczyszyn, K.1
-
25
-
-
78650703724
-
Towards a Usage Control Policy Specification with Petri Nets
-
Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part II. Springer, Heidelberg
-
Katt, B., Zhang, X., Hafner, M.: Towards a Usage Control Policy Specification with Petri Nets. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part II. LNCS, vol. 5871, pp. 905-912. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5871
, pp. 905-912
-
-
Katt, B.1
Zhang, X.2
Hafner, M.3
-
26
-
-
84857260231
-
Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
-
Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. Springer, Heidelberg
-
Kovács, M., Seidl, H.: Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 46-59. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7159
, pp. 46-59
-
-
Kovács, M.1
Seidl, H.2
-
27
-
-
84866371154
-
The Petri Net API: A collection of Petri net-related functions
-
CEUR-WS.org
-
Lohmann, N., Mennicke, S., Sura, C.: The Petri Net API: A collection of Petri net-related functions. In: Algorithms and Tools for Petri Nets. CEUR Workshop Proc., vol. 643, pp. 148-155. CEUR-WS.org (2010)
-
(2010)
Algorithms and Tools for Petri Nets. CEUR Workshop Proc.
, vol.643
, pp. 148-155
-
-
Lohmann, N.1
Mennicke, S.2
Sura, C.3
-
28
-
-
70349373797
-
Petri Net Transformations for Business Processes - A Survey
-
Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. Springer, Heidelberg
-
Lohmann, N., Verbeek, E., Dijkman, R.: Petri Net Transformations for Business Processes - A Survey. In: Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. LNCS, vol. 5460, pp. 46-63. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5460
, pp. 46-63
-
-
Lohmann, N.1
Verbeek, E.2
Dijkman, R.3
-
29
-
-
78049296490
-
How to Implement a Theory of Correctness in the Area of Business Processes and Services
-
Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. Springer, Heidelberg
-
Lohmann, N., Wolf, K.: How to Implement a Theory of Correctness in the Area of Business Processes and Services. In: Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. LNCS, vol. 6336, pp. 61-77. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6336
, pp. 61-77
-
-
Lohmann, N.1
Wolf, K.2
-
30
-
-
81455142699
-
Vulnerability analysis in SOA-based business processes
-
Lowis, L., Accorsi, R.: Vulnerability analysis in SOA-based business processes. IEEE T. Services Computing 4(3), 230-242 (2011)
-
(2011)
IEEE T. Services Computing
, vol.4
, Issue.3
, pp. 230-242
-
-
Lowis, L.1
Accorsi, R.2
-
31
-
-
0024645936
-
Petri nets: Properties, analysis and applications
-
Murata, T.: Petri nets: Properties, analysis and applications. Proc. IEEE 77(4), 541-580 (1989)
-
(1989)
Proc. IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
32
-
-
84861600327
-
Secure Information Flow Awareness for Smart Wireless eHealth Systems
-
IEEE
-
Pfeiffer, S., Unger, S., Timmermann, D., Lehmann, A.: Secure Information Flow Awareness for Smart Wireless eHealth Systems. In: Multi-Conference on Systems, Signals and Devices. IEEE (2012)
-
(2012)
Multi-Conference on Systems, Signals and Devices
-
-
Pfeiffer, S.1
Unger, S.2
Timmermann, D.3
Lehmann, A.4
-
33
-
-
64249086031
-
Security analysis of electronic business processes
-
Röhrig, S., Knorr, K.: Security analysis of electronic business processes. Electronic Commerce Research 4(1-2), 59-81 (2004)
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 59-81
-
-
Röhrig, S.1
Knorr, K.2
-
35
-
-
27544484252
-
A role-based access control policy verification framework for real-time systems
-
IEEE
-
Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: Object-Oriented Real-Time Dependable Systems, pp. 13-20. IEEE (2005)
-
(2005)
Object-Oriented Real-Time Dependable Systems
, pp. 13-20
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
37
-
-
38149062061
-
Generating Petri Net State Spaces
-
Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. Springer, Heidelberg
-
Wolf, K.: Generating Petri Net State Spaces. In: Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. LNCS, vol. 4546, pp. 29-42. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4546
, pp. 29-42
-
-
Wolf, K.1
-
38
-
-
40249115100
-
Verification of strict integrity policy via Petri nets
-
Zhang, Z.-L., Hong, F., Xiao, H.-J.: Verification of strict integrity policy via Petri nets. In: Conference on Systems and Networks Communications, p. 23 (2006)
-
(2006)
Conference on Systems and Networks Communications
, pp. 23
-
-
Zhang, Z.-L.1
Hong, F.2
Xiao, H.-J.3
|