메뉴 건너뛰기




Volumn 132 LNBIP, Issue , 2013, Pages 662-674

Secure and compliant implementation of business process-driven systems

Author keywords

bpmn; business process security; secure service tasks; static program analysis

Indexed keywords

COMPUTER PROGRAMMING; ENTERPRISE RESOURCE MANAGEMENT;

EID: 84873107244     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-36285-9_66     Document Type: Conference Paper
Times cited : (22)

References (28)
  • 2
    • 13544276885 scopus 로고    scopus 로고
    • Process mining and security: Detecting anomalous process executions and checking process conformance
    • doi:10.1016/j.entcs.2004.10.013
    • van der Aalst, W., de Medeiros, A.: Process mining and security: Detecting anomalous process executions and checking process conformance. ENTCS 121, 3-21 (2005), doi:10.1016/j.entcs.2004.10.013
    • (2005) ENTCS , vol.121 , pp. 3-21
    • Van Der Aalst, W.1    De Medeiros, A.2
  • 3
    • 47249156187 scopus 로고    scopus 로고
    • Correctness-preserving configuration of business process models
    • Fiadeiro, J.L., Inverardi, P. (eds.) Springer, Heidelberg
    • van der Aalst, W.M.P., Dumas, M., Gottschalk, F., ter Hofstede, A.H.M., La Rosa, M., Mendling, J.: Correctness-Preserving Configuration of Business Process Models. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol. 4961, pp. 46-61. Springer, Heidelberg (2008)
    • (2008) FASE 2008. LNCS , vol.4961 , pp. 46-61
    • Van Der Aalst, W.M.P.1    Dumas, M.2    Gottschalk, F.3    Ter Hofstede, A.H.M.4    La Rosa, M.5    Mendling, J.6
  • 4
    • 80054075640 scopus 로고    scopus 로고
    • InDico: Information flow analysis of business processes for confidentiality requirements
    • Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) Springer, Heidelberg
    • Accorsi, R., Wonnemann, C.: InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 194-209. Springer, Heidelberg (2011)
    • (2011) STM 2010. LNCS , vol.6710 , pp. 194-209
    • Accorsi, R.1    Wonnemann, C.2
  • 5
    • 79551564021 scopus 로고    scopus 로고
    • Security validation of busi-́ ness processes via model-checking
    • Erlingsson, U., Wieringa, R., Zannone, N Springer, Heidelberg
    • Arsac, W., Compagna, L., Pellegrino, G., Ponta, S.E.: Security Validation of Busi-́ ness Processes via Model-Checking. In: Erlingsson, U., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 29-42. Springer, Heidelberg (2011)
    • (2011) ESSoS 2011. LNCS , vol.6542 , pp. 29-42
    • Arsac, W.1    Compagna, L.2    Pellegrino, G.3    Ponta, S.E.4
  • 7
    • 60849104397 scopus 로고    scopus 로고
    • Automated analysis of security-design models
    • doi:10.1016/j.infsof.2008.05.011; Special Issue on Model-Driven Development for Secure Information Systems
    • Basin, D., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Information and Software Technology 51(5), 815-831 (2009), doi:10.1016/j.infsof.2008.05.011; Special Issue on Model-Driven Development for Secure Information Systems
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 815-831
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 8
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • doi:10.1145/1125808.1125810
    • Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006), doi:10.1145/1125808.1125810
    • (2006) ACM Transactions on Software Engineering and Methodology , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.A.1    Doser, J.2    Lodderstedt, T.3
  • 9
    • 79960159164 scopus 로고    scopus 로고
    • An approach to modular and testable security models of real-world health-care applications
    • ACM Press, New York doi:10.1145/1998441.1998461
    • Brucker, A.D., Brügger, L., Kearney, P., Wolff, B.: An approach to modular and testable security models of real-world health-care applications. In: ACM SAC-MAT, pp. 133-142. ACM Press, New York (2011), doi:10.1145/1998441. 1998461
    • (2011) ACM SAC-MAT , pp. 133-142
    • Brucker, A.D.1    Brügger, L.2    Kearney, P.3    Wolff, B.4
  • 11
    • 33750286091 scopus 로고    scopus 로고
    • A model transformation semantics and analysis methodology for secureuml
    • Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) Springer, Heidelberg
    • Brucker, A.D., Doser, J., Wolff, B.: A Model Transformation Semantics and Analysis Methodology for SecureUML. In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 306-320. Springer, Heidelberg (2006)
    • (2006) MoDELS 2006. LNCS , vol.4199 , pp. 306-320
    • Brucker, A.D.1    Doser, J.2    Wolff, B.3
  • 12
    • 84864034347 scopus 로고    scopus 로고
    • SecureBPMN: Modeling and enforcing access control requirements in business processes
    • ACM Press doi:10.1145/2295136.2295160
    • Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: Modeling and enforcing access control requirements in business processes. In: ACM SACMAT. ACM Press (2012), doi:10.1145/2295136.2295160
    • (2012) ACM SACMAT
    • Brucker, A.D.1    Hang, I.2    Lückemeyer, G.3    Ruparel, R.4
  • 13
    • 70450235104 scopus 로고    scopus 로고
    • Extending access control models with break-glass
    • Carminati, B., Joshi, J. (eds.) ACM Press doi:10.1145/1542207.1542239
    • Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Carminati, B., Joshi, J. (eds.) ACM SACMAT, pp. 197-206. ACM Press (2009), doi:10.1145/1542207.1542239
    • (2009) ACM SACMAT , pp. 197-206
    • Brucker, A.D.1    Petritsch, H.2
  • 14
    • 51449094371 scopus 로고    scopus 로고
    • Semantics and analysis of business process models in BPMN
    • doi:10.1016/j.infsof.2008.02.006
    • Dijkman, R.M., Dumas, M., Ouyang, C.: Semantics and analysis of business process models in BPMN. Information & Software Technology 50(12), 1281-1294 (2008), doi:10.1016/j.infsof.2008.02.006
    • (2008) Information & Software Technology , vol.50 , Issue.12 , pp. 1281-1294
    • Dijkman, R.M.1    Dumas, M.2    Ouyang, C.3
  • 15
    • 84873175283 scopus 로고    scopus 로고
    • HIPAA: Health Insurance Portability and Accountability Act of 1996
    • HIPAA: Health Insurance Portability and Accountability Act of 1996 (1996), http://www.cms.hhs.gov/HIPAAGenInfo/
    • (1996)
  • 16
    • 55049118116 scopus 로고    scopus 로고
    • Model-based security analysis of the german health card architecture
    • Jürjens, J., Rumm, R.: Model-based security analysis of the german health card architecture. Methods Inf. Med. 47(5), 409-416 (2008)
    • (2008) Methods Inf. Med. , vol.47 , Issue.5 , pp. 409-416
    • Jürjens, J.1    Rumm, R.2
  • 17
    • 70849086808 scopus 로고    scopus 로고
    • Proactive caching: Generating caching heuristics for business process environments
    • IEEE Computer Society doi:10.1109/CSE.2009.177
    • Kohler, M., Brucker, A.D., Schaad, A.: Proactive Caching: Generating caching heuristics for business process environments. In: International Conference on Computational Science and Engineering (CSE), vol. 3, pp. 207-304. IEEE Computer Society (2009), doi:10.1109/CSE.2009.177
    • (2009) International Conference on Computational Science and Engineering (CSE) , vol.3 , pp. 207-304
    • Kohler, M.1    Brucker, A.D.2    Schaad, A.3
  • 18
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • J́eźequel, J.M., Hussmann, H., Cook, S. (eds.) Springer, Heidelberg
    • Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J́eźequel, J.M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
    • (2002) UML 2002. LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.A.2    Doser, J.3
  • 19
    • 57049148622 scopus 로고    scopus 로고
    • Automated XACML policy reconfiguration for evaluation optimisation
    • Win, B.D., Lee, S.W., Monga, M. (eds.) ACM doi:10.1145/1370905.1370906
    • Miseldine, P.: Automated XACML policy reconfiguration for evaluation optimisation. In: Win, B.D., Lee, S.W., Monga, M. (eds.) SESS, pp. 1-8. ACM (2008), doi:10.1145/1370905.1370906
    • (2008) SESS , pp. 1-8
    • Miseldine, P.1
  • 21
    • 84873182763 scopus 로고    scopus 로고
    • OASIS: eXtensible Access Control Markup Language (XACML), version 2.0
    • OASIS: eXtensible Access Control Markup Language (XACML), version 2.0 (2005), http://docs.oasis-open.org/xacml/2.0/XACML-2.0-OS-NORMATIVE.zip
    • (2005)
  • 22
    • 84873148845 scopus 로고    scopus 로고
    • Object Management Group: Business process model and notation (BPMN), version 2.0 Available as OMG document formal/2011-01-03 2011
    • Object Management Group: Business process model and notation (BPMN), version 2.0 (2011), Available as OMG document formal/2011-01-03
  • 23
    • 34247151648 scopus 로고    scopus 로고
    • A BPMN extension for the modeling of security requirements in business processes
    • doi:10.1093/ietisy/e90-d.4.745
    • Rodríguez, A., Ferńandez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE-Trans. Inf. Syst. E90-D, 745-752 (2007), doi:10.1093/ietisy/e90-d.4.745
    • (2007) IEICE-Trans. Inf. Syst. E90-D , pp. 745-752
    • Rodríguez, A.1    Ferńandez-Medina, E.2    Piattini, M.3
  • 24
    • 33646027053 scopus 로고    scopus 로고
    • Specification and validation of authorisation constraints using UML and OCL
    • De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) Springer, Heidelberg
    • Sohr, K., Ahn, G.J., Gogolla, M., Migge, L.: Specification and Validation of Authorisation Constraints Using UML and OCL. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 64-79. Springer, Heidelberg (2005)
    • (2005) ESORICS 2005. LNCS , vol.3679 , pp. 64-79
    • Sohr, K.1    Ahn, G.J.2    Gogolla, M.3    Migge, L.4
  • 25
    • 79451469078 scopus 로고    scopus 로고
    • An approach to capture authorisation requirements in business processes
    • doi:10.1007/s00766-010-0103-y
    • Wolter, C., Meinel, C.: An approach to capture authorisation requirements in business processes. Requir. Eng. 15(4), 359-373 (2010), doi:10.1007/s00766- 010-0103-y
    • (2010) Requir. Eng. , vol.15 , Issue.4 , pp. 359-373
    • Wolter, C.1    Meinel, C.2
  • 26
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • doi:10.1016/j.sysarc.2008.10.002; Secure Service-Oriented Architectures (Special Issue on Secure SOA
    • Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture 55(4), 211-223 (2009), doi:10.1016/j.sysarc.2008.10.002; Secure Service-Oriented Architectures (Special Issue on Secure SOA)
    • (2009) Journal of Systems Architecture , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1    Menzel, M.2    Schaad, A.3    Miseldine, P.4    Meinel, C.5
  • 27
    • 38049132539 scopus 로고    scopus 로고
    • Modeling of task-based authorization constraints in BPMN
    • Alonso, G., Dadam, P., Rosemann, M. (eds.) Springer, Heidelberg
    • Wolter, C., Schaad, A.: Modeling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64-79. Springer, Heidelberg (2007)
    • (2007) BPM 2007. LNCS , vol.4714 , pp. 64-79
    • Wolter, C.1    Schaad, A.2
  • 28
    • 38149139426 scopus 로고    scopus 로고
    • Deriving XACML policies from business process models
    • Weske, M., Hacid, M.-S., Godart, C. (eds.) Springer, Heidelberg
    • Wolter, C., Schaad, A., Meinel, C.: Deriving XACML Policies from Business Process Models. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE 2007 Workshops. LNCS, vol. 4832, pp. 142-153. Springer, Heidelberg (2007)
    • (2007) WISE 2007 Workshops. LNCS , vol.4832 , pp. 142-153
    • Wolter, C.1    Schaad, A.2    Meinel, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.