Implementing Timed Petri Net in Security Information Systems

@article{Chin2007ImplementingTP,
  title={Implementing Timed Petri Net in Security Information Systems},
  author={H. H. Chin and Chu-Feng Huang and A. A. Jafari},
  journal={2007 Thirty-Ninth Southeastern Symposium on System Theory},
  year={2007},
  pages={214-220}
}
A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad… CONTINUE READING
2 Citations
12 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-2 of 2 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Secure computer systems: Unified exposition and Multics interpretation

  • D. Bell, L. LaPadula
  • Technical Report MTR-2997, Mitre Corporation…
  • 1976
Highly Influential
3 Excerpts

Secure Workflow Model

  • P.C.K. Hung
  • Ph. D. Thesis, Department of Computer Science…
  • 2001
2 Excerpts

Condensed State Spaces for Colored Petri Nets

  • K.Jensen
  • Formal Methods in System Design 9, 1996.
  • 1996
2 Excerpts

Petri Nets

  • J. L. Peterson
  • Computing Surveys, Vol.9, No.3, September 1977…
  • 1977
2 Excerpts

Similar Papers

Loading similar papers…