메뉴 건너뛰기




Volumn 47, Issue , 2015, Pages 244-257

Information leak detection in business process models: Theory, application, and tool support

Author keywords

Automated analysis; Business process security; Software and process engineering

Indexed keywords

AUTOMATED ANALYSIS; BUSINESS PROCESS; BUSINESS PROCESS MODEL; INFORMATION LEAK DETECTIONS; TOOL SUPPORT;

EID: 84908220797     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2013.12.006     Document Type: Article
Times cited : (29)

References (57)
  • 1
    • 84866391692 scopus 로고    scopus 로고
    • Automatic information flow analysis of business process models
    • Springer, Heidelberg, Germany
    • R. Accorsi, A. Lehmann, Automatic information flow analysis of business process models, in: BPM 2012, Lecture Notes in Computer Science, vol. 7481, Springer, Heidelberg, Germany, 2012, pp. 172-187.
    • (2012) BPM 2012, Lecture Notes in Computer Science , vol.7481 , pp. 172-187
    • Accorsi, R.1    Lehmann, A.2
  • 2
    • 81455142699 scopus 로고    scopus 로고
    • Vulnerability analysis in SOA-based business processes
    • L. Lowis, and R. Accorsi Vulnerability analysis in SOA-based business processes IEEE Trans. Serv. Comput. 4 3 2011 230 242
    • (2011) IEEE Trans. Serv. Comput. , vol.4 , Issue.3 , pp. 230-242
    • Lowis, L.1    Accorsi, R.2
  • 3
    • 84908165983 scopus 로고    scopus 로고
    • ISO/IEC, ISO/IEC Information Security Management System 27001, 2005
    • ISO/IEC, ISO/IEC Information Security Management System 27001, 2005 〈 www.27000.org/iso-27001.htm 〉.
  • 4
    • 84908165982 scopus 로고    scopus 로고
    • DoD, Trusted computer security evaluation criteria, 1983
    • DoD, Trusted computer security evaluation criteria, 1983 〈 http://csrc.nist.gov/publications/histroy/dod85.pdf 〉.
  • 5
    • 84861031279 scopus 로고    scopus 로고
    • Automated analysis of infinite state workflows with access control policies
    • C. Meadows, C. Fernandez-Gago, Springer Berlin, Heidelberg
    • A. Armando, and S. Ranise Automated analysis of infinite state workflows with access control policies C. Meadows, C. Fernandez-Gago, Security and Trust Management, Lecture Notes in Computer Science vol. 7170 2012 Springer Berlin, Heidelberg 157 174
    • (2012) Security and Trust Management, Lecture Notes in Computer Science , vol.7170 , pp. 157-174
    • Armando, A.1    Ranise, S.2
  • 9
    • 84857260231 scopus 로고    scopus 로고
    • Runtime enforcement of information flow security in tree manipulating processes
    • G. Barthe, B. Livshits, R. Scandariato, Springer Berlin, Heidelberg
    • M. Kovács, and H. Seidl Runtime enforcement of information flow security in tree manipulating processes G. Barthe, B. Livshits, R. Scandariato, Engineering Secure Software and Systems, Lecture Notes in Computer Science vol. 7159 2012 Springer Berlin, Heidelberg 46 59
    • (2012) Engineering Secure Software and Systems, Lecture Notes in Computer Science , vol.7159 , pp. 46-59
    • Kovács, M.1    Seidl, H.2
  • 10
    • 64249086031 scopus 로고    scopus 로고
    • Security analysis of electronic business processes
    • S. Röhrig, and K. Knorr Security analysis of electronic business processes Electron. Commer. Res. 4 2004 59 81
    • (2004) Electron. Commer. Res. , vol.4 , pp. 59-81
    • Röhrig, S.1    Knorr, K.2
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D.E. Denning, and P.J. Denning Certification of programs for secure information flow Commun. ACM 20 7 1977 504 513
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 70349373797 scopus 로고    scopus 로고
    • Petri net transformations for business processes - A survey
    • ToPNoC II
    • N. Lohmann, H. Verbeek, R.M. Dijkman, Petri net transformations for business processes - a survey, in: Lecture Notes in Computer Science, ToPNoC II, vol. 5460, 2009, pp. 46-63.
    • (2009) Lecture Notes in Computer Science , vol.5460 , pp. 46-63
    • Lohmann, N.1    Verbeek, H.2    Dijkman, R.M.3
  • 13
    • 74049123448 scopus 로고    scopus 로고
    • Structural non-interference in elementary and trace nets
    • N. Busi, and R. Gorrieri Structural non-interference in elementary and trace nets Math. Struct. Comput. Sci. 19 6 2009 1065 1090
    • (2009) Math. Struct. Comput. Sci. , vol.19 , Issue.6 , pp. 1065-1090
    • Busi, N.1    Gorrieri, R.2
  • 14
    • 79959293472 scopus 로고    scopus 로고
    • Strong non-leak guarantees for workflow models
    • W.C. Chu, W.E. Wong, M.J. Palakal, C.-C. Hung (Eds.)
    • R. Accorsi, C. Wonnemann, Strong non-leak guarantees for workflow models, in: W.C. Chu, W.E. Wong, M.J. Palakal, C.-C. Hung (Eds.), SAC, ACM, USA, 2011, pp. 308-314.
    • (2011) SAC, ACM, USA , pp. 308-314
    • Accorsi, R.1    Wonnemann, C.2
  • 15
    • 80455144533 scopus 로고    scopus 로고
    • SWAT: A security workflow toolkit for reliably secure process-aware information systems
    • IEEE, USA
    • R. Accorsi, C. Wonnemann, S. Dochow, SWAT: A security workflow toolkit for reliably secure process-aware information systems, in: ARES 2011, IEEE, USA, 2011, pp. 692-697.
    • (2011) ARES 2011 , pp. 692-697
    • Accorsi, R.1    Wonnemann, C.2    Dochow, S.3
  • 16
    • 67650649695 scopus 로고    scopus 로고
    • Petri net security checker: Structural non-interference at work
    • Springer, Heidelberg
    • S. Frau, R. Gorrieri, C. Ferigato, Petri net security checker: structural non-interference at work, in: FAST 2008, Lecture Notes in Computer Science, vol. 5491, Springer, Heidelberg, 2008, pp. 210-225.
    • (2008) FAST 2008, Lecture Notes in Computer Science , vol.5491 , pp. 210-225
    • Frau, S.1    Gorrieri, R.2    Ferigato, C.3
  • 17
    • 0024645936 scopus 로고
    • Petri nets properties, analysis and applications
    • T. Murata Petri nets properties, analysis and applications Proc. IEEE 77 4 1989 541 580
    • (1989) Proc. IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 18
    • 38149062061 scopus 로고    scopus 로고
    • Generating Petri net state spaces
    • J. Kleijn, A. Yakovlev, Springer Heidelberg
    • K. Wolf Generating Petri net state spaces J. Kleijn, A. Yakovlev, ICATPN 2007, Lecture Notes in Computer Science vol. 4546 2007 Springer Heidelberg 29 42
    • (2007) ICATPN 2007, Lecture Notes in Computer Science , vol.4546 , pp. 29-42
    • Wolf, K.1
  • 19
    • 84873122948 scopus 로고    scopus 로고
    • Modeling wizard for confidential business processes
    • R. Accorsi, R. Matulevicius (Eds.) Tallinn, 3 September 2012, Proceedings LNBIP
    • A. Lehmann, N. Lohmann, Modeling wizard for confidential business processes, in: R. Accorsi, R. Matulevicius (Eds.), 1st Joint International Workshop on Security in Business Processes (SBP'12), Tallinn, 3 September 2012, Proceedings, 2012, LNBIP, 10.1007/978-3-642-36285-9-67.
    • (2012) 1st Joint International Workshop on Security in Business Processes (SBP'12)
    • Lehmann, A.1    Lohmann, N.2
  • 20
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. Lampson A note on the confinement problem Commun. ACM 16 10 1973 613 615
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 22
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud exploring information leakage in third-party compute clouds
    • E. Al-Shaer, S. Jha, A.D. Keromytis, ACM USA
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage Hey, you, get off of my cloud exploring information leakage in third-party compute clouds E. Al-Shaer, S. Jha, A.D. Keromytis, ACM Conference on Computer and Communications Security 2009 ACM USA 199 212
    • (2009) ACM Conference on Computer and Communications Security , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 23
    • 84875146484 scopus 로고    scopus 로고
    • Virtualization issues, security threats, and solutions
    • M. Pearce, S. Zeadally, and R. Hunt Virtualization issues, security threats, and solutions ACM Comput. Surv. 45 2 2013 17:1 17:39
    • (2013) ACM Comput. Surv. , vol.45 , Issue.2 , pp. 171-1739
    • Pearce, M.1    Zeadally, S.2    Hunt, R.3
  • 24
    • 77955197190 scopus 로고    scopus 로고
    • Side-channel leaks in web applications: A reality today, a challenge tomorrow
    • IEEE, USA
    • S. Chen, R. Wang, X. Wang, K. Zhang, Side-channel leaks in web applications: a reality today, a challenge tomorrow, in: IEEE Symposium on Security and Privacy, IEEE, USA, 2010, pp. 191-206.
    • (2010) IEEE Symposium on Security and Privacy , pp. 191-206
    • Chen, S.1    Wang, R.2    Wang, X.3    Zhang, K.4
  • 25
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 28
    • 80054075640 scopus 로고    scopus 로고
    • Indico information flow analysis of business processes for confidentiality requirements
    • J. Cuéllar, J. Lopez, G. Barthe, A. Pretschner, Springer
    • R. Accorsi, and C. Wonnemann Indico information flow analysis of business processes for confidentiality requirements J. Cuéllar, J. Lopez, G. Barthe, A. Pretschner, STM, Lecture Notes in Computer Science vol. 6710 2010 Springer 194 209
    • (2010) STM, Lecture Notes in Computer Science , vol.6710 , pp. 194-209
    • Accorsi, R.1    Wonnemann, C.2
  • 29
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning A lattice model of secure information flow Commun. ACM 19 5 1976 236 243
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 33
    • 0002719897 scopus 로고    scopus 로고
    • The application of Petri nets to workflow management
    • W.M.P.v.d. Aalst The application of Petri nets to workflow management J. Circuits Syst. Comput. 8 1 1998 21 66
    • (1998) J. Circuits Syst. Comput. , vol.8 , Issue.1 , pp. 21-66
    • Aalst, W.M.P.V.D.1
  • 34
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part i: Information flow)
    • R. Focardi, R. Gorrieri, Springer Heidelberg, Germany
    • R. Focardi, and R. Gorrieri Classification of security properties (Part i: Information flow) R. Focardi, R. Gorrieri, FOSAD, Lecture Notes in Computer Science vol. 2171 2000 Springer Heidelberg, Germany 331 396
    • (2000) FOSAD, Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 37
    • 78049296490 scopus 로고    scopus 로고
    • How to implement a theory of correctness in the area of business processes and services
    • R. Hull, J. Mendling, S. Tai (Eds.), Business Process Management, 8th International Conference, BPM 2010, Hoboken, NJ, USA, September 14-16, 2010 Springer-Verlag
    • N. Lohmann, K. Wolf, How to implement a theory of correctness in the area of business processes and services, in: R. Hull, J. Mendling, S. Tai (Eds.), Business Process Management, 8th International Conference, BPM 2010, Hoboken, NJ, USA, September 14-16, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6336, Springer-Verlag, 2010, pp. 61-77.
    • (2010) Proceedings, Lecture Notes in Computer Science , vol.6336 , pp. 61-77
    • Lohmann, N.1    Wolf, K.2
  • 38
    • 84866371154 scopus 로고    scopus 로고
    • The Petri Net API: A collection of Petri net-related functions
    • M. Schwarick, M. Heiner (Eds.) Cottbus, Germany, October 7-8, 2010, CEUR Workshop Proceedings, CEUR-WS.org
    • N. Lohmann, S. Mennicke, C. Sura, The Petri Net API: a collection of Petri net-related functions, in: M. Schwarick, M. Heiner (Eds.), Proceedings of the 17th German Workshop on Algorithms and Tools for Petri Nets (AWPN 2010), Cottbus, Germany, October 7-8, 2010, CEUR Workshop Proceedings, CEUR-WS.org, vol. 643, 2010, pp. 148-155.
    • (2010) Proceedings of the 17th German Workshop on Algorithms and Tools for Petri Nets (AWPN 2010) , vol.643 , pp. 148-155
    • Lohmann, N.1    Mennicke, S.2    Sura, C.3
  • 39
    • 79955656399 scopus 로고    scopus 로고
    • Analysis on demand instantaneous soundness checking of industrial business process models
    • D. Fahland, C. Favre, J. Koehler, N. Lohmann, H. Völzer, and K. Wolf Analysis on demand instantaneous soundness checking of industrial business process models Data Knowl. Eng. 70 5 2011 448 466
    • (2011) Data Knowl. Eng. , vol.70 , Issue.5 , pp. 448-466
    • Fahland, D.1    Favre, C.2    Koehler, J.3    Lohmann, N.4    Völzer, H.5    Wolf, K.6
  • 40
    • 80054978864 scopus 로고    scopus 로고
    • Security for workflow systems
    • M. Gertz, S. Jajodia, Springer US
    • V. Atluri, and J. Warner Security for workflow systems M. Gertz, S. Jajodia, Handbook of Database Security 2008 Springer US 213 230
    • (2008) Handbook of Database Security , pp. 213-230
    • Atluri, V.1    Warner, J.2
  • 44
    • 84867342186 scopus 로고    scopus 로고
    • SOAC-Net a model to manage service-based business process authorization
    • L.E. Moser, M. Parashar, P.C.K. Hung, IEEE USA
    • H. Sun, J. Yang, W. Zhao, and S. Nepal SOAC-Net a model to manage service-based business process authorization L.E. Moser, M. Parashar, P.C.K. Hung, IEEE International Conference on Services Computing 2012 IEEE USA 376 383
    • (2012) IEEE International Conference on Services Computing , pp. 376-383
    • Sun, H.1    Yang, J.2    Zhao, W.3    Nepal, S.4
  • 46
    • 80052886058 scopus 로고    scopus 로고
    • Formal specification and verification of modular security policy based on colored Petri nets
    • H. Huang, and H. Kirchner Formal specification and verification of modular security policy based on colored Petri nets IEEE Trans. Dependable Secur. Comput. 8 2011 852 865
    • (2011) IEEE Trans. Dependable Secur. Comput. , vol.8 , pp. 852-865
    • Huang, H.1    Kirchner, H.2
  • 47
    • 65049092304 scopus 로고    scopus 로고
    • Using colored Petri nets to model and analyze workflow with separation of duty constraints
    • Y. Lu, L. Zhang, and J. Sun Using colored Petri nets to model and analyze workflow with separation of duty constraints J. Adv. Manuf. Technol. 40 2009 179 192
    • (2009) J. Adv. Manuf. Technol. , Issue.40 , pp. 179-192
    • Lu, Y.1    Zhang, L.2    Sun, J.3
  • 48
    • 78650703724 scopus 로고    scopus 로고
    • Towards a usage control policy specification with Petri nets
    • R. Meersman, T.S. Dillon, P. Herrero, Springer
    • B. Katt, X. Zhang, and M. Hafner Towards a usage control policy specification with Petri nets R. Meersman, T.S. Dillon, P. Herrero, OTM Conferences (2), Lecture Notes in Computer Science vol. 5871 2009 Springer 905 912
    • (2009) OTM Conferences (2), Lecture Notes in Computer Science , vol.5871 , pp. 905-912
    • Katt, B.1    Zhang, X.2    Hafner, M.3
  • 49
    • 84856273290 scopus 로고    scopus 로고
    • Automated certification for compliant cloud-based business processes
    • R. Accorsi, L. Lowis, and Y. Sato Automated certification for compliant cloud-based business processes Bus. Inf. Syst. Eng. 3 3 2011 145 154
    • (2011) Bus. Inf. Syst. Eng. , vol.3 , Issue.3 , pp. 145-154
    • Accorsi, R.1    Lowis, L.2    Sato, Y.3
  • 54
    • 84863590198 scopus 로고    scopus 로고
    • On the exploitation of process mining for security audits the conformance checking case
    • S. Ossowski, P. Lecca, ACM USA
    • R. Accorsi, and T. Stocker On the exploitation of process mining for security audits the conformance checking case S. Ossowski, P. Lecca, SAC 2012 ACM USA 1709 1716
    • (2012) SAC , pp. 1709-1716
    • Accorsi, R.1    Stocker, T.2
  • 56
    • 0003047591 scopus 로고
    • Stubborn sets for reduced state space generation
    • Springer, Heidelberg, Germany
    • A. Valmari, Stubborn sets for reduced state space generation, in: APN, Lecture Notes in Computer Science, vol. 483, Springer, Heidelberg, Germany, 1990, pp. 491-515.
    • (1990) APN, Lecture Notes in Computer Science , vol.483 , pp. 491-515
    • Valmari, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.