SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems

@article{Accorsi2011SWATAS,
  title={SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems},
  author={Rafael Accorsi and Claus Wonnemann and Sebastian Dochow},
  journal={2011 Sixth International Conference on Availability, Reliability and Security},
  year={2011},
  pages={692-697}
}
This paper reports on ongoing work on SWAT, a new toolkit for security workflow analysis. SWAT provides a platform for the realization and testing of well-founded methods to detect information leaks in workflows, both for the workflow certification and for audit based upon the execution traces. Besides presenting the SWAT's functionality and high-level architecture, an example illustrates its operation. 

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 18 CITATIONS

On Process Rewriting for Business Process Security

  • SIMPDA
  • 2013
VIEW 8 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Certified Information Flow Analysis of Service Implementations

  • 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA)
  • 2018
VIEW 1 EXCERPT
CITES RESULTS

A secure log architecture to support remote auditing

  • Mathematical and Computer Modelling
  • 2013
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 29 REFERENCES

Finding vulnerabilities in SOAbased business processes

L. Lowis, R. Accorsi
  • IEEE Transactions on Service Computing, 2011, to appear.
  • 2011
VIEW 1 EXCERPT

lyzing interacting WS - BPEL processes using flexible model generation

P. Massuthe N. Lohmann, C. Stahl, D. Weinberg
  • Guidelines on security and privacy in public cloud computing
  • 2011

Security & resilience in governmental clouds

ENISA
  • European Network and Information Security Agency, Tech. Rep., 2010.
  • 2010
VIEW 2 EXCERPTS

Similar Papers

Loading similar papers…