메뉴 건너뛰기




Volumn 175 LNBIP, Issue , 2014, Pages 200-214

Modeling and verifying security policies in business processes

Author keywords

BPMN; Compliance; Information systems; Security policies

Indexed keywords

AIR TRAFFIC CONTROL; COMPLIANCE CONTROL; COMPUTER HARDWARE DESCRIPTION LANGUAGES; FORMAL LANGUAGES; INFORMATION SYSTEMS; INFORMATION USE; MANAGEMENT INFORMATION SYSTEMS; QUERY LANGUAGES; SEARCH ENGINES; SECURITY SYSTEMS; SPECIFICATIONS; SYSTEMS ANALYSIS; SYSTEMS ENGINEERING; COMPUTATIONAL LINGUISTICS;

EID: 84904562479     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-662-43745-2_14     Document Type: Conference Paper
Times cited : (46)

References (35)
  • 1
    • 70350665919 scopus 로고    scopus 로고
    • Technical report, ISACA
    • An introduction to the business model for information security. Technical report, ISACA (2009), http://www. isaca. org/Knowledge-Center/Research/ResearchDeliverables/Pages/An-Introduction-to-the-Business-Model-for-Information-Security. aspx.
    • (2009) An introduction to the business model for information security
  • 2
    • 84904546030 scopus 로고    scopus 로고
    • Federal Aviation Administration, (last visited March 2014)
    • Federal Aviation Administration. SWIM ATM case study, http://www. faa. gov/about/office org/headquarters offices/ato/service units/techops/atc comms services/swim/(last visited March 2014).
    • SWIM ATM case study
  • 3
    • 84874268919 scopus 로고    scopus 로고
    • BPMN-Q: A language to query business processes
    • In:, St. Goar, Germany. LNI, vol. P-119,. GI
    • Awad, A.: BPMN-Q: A language to query business processes. In: EMISA, St. Goar, Germany. LNI, vol. P-119, pp. 115-128. GI (2007).
    • (2007) EMISA , pp. 115-128
    • Awad, A.1
  • 6
    • 84864034347 scopus 로고    scopus 로고
    • SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes
    • In
    • Brucker, A. D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes. In: Proc. of SACMAT 2012, pp. 123-126 (2012).
    • (2012) Proc. of SACMAT 2012 , pp. 123-126
    • Brucker, A.D.1    Hang, I.2    Lückemeyer, G.3    Ruparel, R.4
  • 7
    • 84892380317 scopus 로고    scopus 로고
    • A reference model of information assurance and security
    • In:, (September
    • Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: Eighth International Conference on ARES, pp. 546-555 (September 2013).
    • (2013) Eighth International Conference on ARES , pp. 546-555
    • Cherdantseva, Y.1    Hilton, J.2
  • 8
    • 38449113336 scopus 로고    scopus 로고
    • Querying structural and behavioral properties of business processes
    • In: Arenas, M., Schwartzbach, M.I. (eds.),. Springer, Heidelberg
    • Deutch, D., Milo, T.: Querying structural and behavioral properties of business processes. In: Arenas, M., Schwartzbach, M. I. (eds.) DBPL 2007. LNCS, vol. 4797, pp. 169-185. Springer, Heidelberg (2007).
    • (2007) DBPL 2007. LNCS , vol.4797 , pp. 169-185
    • Deutch, D.1    Milo, T.2
  • 10
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Firesmith, D.: Specifying reusable security requirements. JOT 3(1), 61-75 (2004).
    • (2004) JOT , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 11
    • 38349004887 scopus 로고    scopus 로고
    • Auditing business process compliance
    • In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.),. Springer, Heidelberg
    • Ghose, A., Koliadis, G.: Auditing business process compliance. In: Krämer, B. J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169-180. Springer, Heidelberg (2007).
    • (2007) ICSOC 2007. LNCS , vol.4749 , pp. 169-180
    • Ghose, A.1    Koliadis, G.2
  • 12
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618-644 (2007).
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 13
    • 79955163100 scopus 로고    scopus 로고
    • Umlsec: Extending uml for secure systems development
    • In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.),. Springer, Heidelberg
    • Jürjens, J.: Umlsec: Extending uml for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002).
    • (2002) UML 2002. LNCS , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 14
    • 84892405502 scopus 로고    scopus 로고
    • An analysis and evaluation of security aspects in the business process model and notation
    • In
    • Leitner, M., Miller, M., Rinderle-Ma, S.: An analysis and evaluation of security aspects in the business process model and notation. In: Proc. of ARES, pp. 262-267 (2013).
    • (2013) Proc. of ARES , pp. 262-267
    • Leitner, M.1    Miller, M.2    Rinderle-Ma, S.3
  • 15
    • 84892614680 scopus 로고    scopus 로고
    • A systematic review on security in process-aware information systems-constitution, challenges, and future directions
    • Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems-constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273-293 (2014).
    • (2014) Inf. Softw. Technol , vol.56 , Issue.3 , pp. 273-293
    • Leitner, M.1    Rinderle-Ma, S.2
  • 16
    • 85006049205 scopus 로고    scopus 로고
    • An experimental study on the design and modeling of security concepts in business processes
    • In
    • Leitner, M., Schefer-Wenzl, S., Rinderle-Ma, S., Strembeck, M.: An experimental study on the design and modeling of security concepts in business processes. In: Proc. of PoEM, pp. 236-250 (2013).
    • (2013) Proc. of PoEM , pp. 236-250
    • Leitner, M.1    Schefer-Wenzl, S.2    Rinderle-Ma, S.3    Strembeck, M.4
  • 17
    • 34247861351 scopus 로고    scopus 로고
    • A static compliance-checking framework for business process models
    • Liu, Y., Müller, S., Xu, K.: A static compliance-checking framework for business process models. IBM Syst. J. 46(2), 335-361 (2007).
    • (2007) IBM Syst. J , vol.46 , Issue.2 , pp. 335-361
    • Liu, Y.1    Müller, S.2    Xu, K.3
  • 19
    • 70349683196 scopus 로고    scopus 로고
    • Security requirements specification in serviceoriented business process management
    • In
    • Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in serviceoriented business process management. In: Proc of ARES 2009, pp. 41-48 (2009).
    • (2009) Proc of ARES 2009 , pp. 41-48
    • Menzel, M.1    Thomas, I.2    Meinel, C.3
  • 20
    • 84863586009 scopus 로고    scopus 로고
    • Security and safety of assets in business processes
    • In:,. ACM, USA
    • Monakova, G., Brucker, A. D., Schaad, A.: Security and safety of assets in business processes. In: Applied Computing, vol. 27, pp. 1667-1673. ACM, USA (2012).
    • (2012) Applied Computing , vol.27 , pp. 1667-1673
    • Monakova, G.1    Brucker, A.D.2    Schaad, A.3
  • 21
    • 73449140991 scopus 로고    scopus 로고
    • The physics of notations: Toward a scientific basis for constructing visual notations in software engineering
    • Moody, D.: The physics of notations: Toward a scientific basis for constructing visual notations in software engineering. IEEE Trans. Softw. Eng. 35, 756-779 (2009).
    • (2009) IEEE Trans. Softw. Eng , vol.35 , pp. 756-779
    • Moody, D.1
  • 23
    • 84904545353 scopus 로고    scopus 로고
    • (January, O
    • O.: BPMN 2. 0, http://www. omg. org/spec/BPMN/2. 0 (January 2011).
    • (2011) BPMN 2. 0
  • 24
    • 84892416940 scopus 로고    scopus 로고
    • Our excessively simplistic information security model and how to fix it
    • Parker, D.: Our excessively simplistic information security model and how to fix it. ISSA Journal, 12-21 (2010).
    • (2010) ISSA Journal , pp. 12-21
    • Parker, D.1
  • 27
    • 0036466927 scopus 로고    scopus 로고
    • Using model checking to help discover mode confusions and other automation surprises
    • Rushby, J.: Using model checking to help discover mode confusions and other automation surprises. Reliability Engineering and System Safety 75, 167-177 (2002).
    • (2002) Reliability Engineering and System Safety , vol.75 , pp. 167-177
    • Rushby, J.1
  • 28
    • 38049150939 scopus 로고    scopus 로고
    • Modeling control objectives for business process compliance
    • In: Alonso, G., Dadam, P., Rosemann, M. (eds.),. Springer, Heidelberg
    • Sadiq, W., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149-164. Springer, Heidelberg (2007).
    • (2007) BPM 2007. LNCS , vol.4714 , pp. 149-164
    • Sadiq, W.1    Governatori, G.2    Namiri, K.3
  • 29
    • 84856582306 scopus 로고    scopus 로고
    • A domain-specific language for modelling security objectives in a business process models of soa applications
    • Saleem, M., Jaafar, J., Hassan, M.: A domain-specific language for modelling security objectives in a business process models of soa applications. AISS 4(1), 353-362 (2012).
    • (2012) AISS , vol.4 , Issue.1 , pp. 353-362
    • Saleem, M.1    Jaafar, J.2    Hassan, M.3
  • 30
    • 84872768719 scopus 로고    scopus 로고
    • Aligning service-oriented architectures with security requirements
    • In: Meersman, R., et al. (eds.), Part I. LNCS,. Springer, Heidelberg
    • Salnitri, M., Dalpiaz, F., Giorgini, P.: Aligning service-oriented architectures with security requirements. In: Meersman, R., et al. (eds.) OTM 2012, Part I. LNCS, vol. 7565, pp. 232-249. Springer, Heidelberg (2012).
    • (2012) OTM 2012 , vol.7565 , pp. 232-249
    • Salnitri, M.1    Dalpiaz, F.2    Giorgini, P.3
  • 31
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • In: Focardi, R., Gorrieri, R. (eds.),. Springer, Heidelberg
    • Samarati, P., di Vimercati, S. C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137-196. Springer, Heidelberg (2001).
    • (2001) FOSAD 2000. LNCS , vol.2171 , pp. 137-196
    • Samarati, P.1    di Vimercati, S.C.2
  • 32
    • 75649132702 scopus 로고    scopus 로고
    • Ontology-based representation of compliance requirements for service processes
    • In
    • Schmidt, R., Bartsch, C., Oberhauser, R.: Ontology-based representation of compliance requirements for service processes. In: Proc. of CEUR 2007 (2007).
    • (2007) Proc. of CEUR 2007
    • Schmidt, R.1    Bartsch, C.2    Oberhauser, R.3
  • 34
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. JSA 55(4), 211-223 (2009).
    • (2009) JSA , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1    Menzel, M.2    Schaad, A.3    Miseldine, P.4    Meinel, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.