Model Checking of Security-Sensitive Business Processes

@inproceedings{Armando2009ModelCO,
  title={Model Checking of Security-Sensitive Business Processes},
  author={Alessandro Armando and Serena Elisa Ponta},
  booktitle={Formal Aspects in Security and Trust},
  year={2009}
}
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that model checking can be profitably used for the automatic analysis of security-sensitive business processes. But building a formal model that simultaneously accounts for both the workflow and the access control policy is a time consuming and error-prone activity. In this paper we present a new approach to model checking… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 34 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

LTL model checking for security protocols

  • Journal of Applied Non-Classical Logics
  • 2009
VIEW 1 EXCERPT

Model checking of security-sensitive business processes (2009) http://www.ai-lab.it/serena/tr090724.pdf

A. Armando, S. E. Ponta
  • 2009
VIEW 1 EXCERPT

Formal Verification of Business Workflows and Role Based Access Control Systems

  • The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
  • 2007

SAT-based model-checking for security protocols analysis

  • International Journal of Information Security
  • 2007
VIEW 2 EXCERPTS

Modelling and resource allocation planning of BPEL workflows under security constraints

A. Cerone, Z. Xiangpeng, P. Krishnan
  • TR 336, UNU-IIST
  • 2006
VIEW 2 EXCERPTS