Model Checking Based Approach for Compliance Checking
نویسندگان
چکیده
منابع مشابه
Privacy Compliance Checking using a Model-Based Approach
In order to conduct business, organizations must try to assess and ensure compliance with privacy legislation, policies and regulations, as part of their IT governance initiatives. As well as these ‘data protection’ concerns, there may be an intangible value in proposing an ‘open’ approach to privacy compliance, for example by showing all privacy-relevant information as is done within the Googl...
متن کاملAn Efficient Business Process Compliance Checking Approach
Assuring compliant business processes is an important task of business process management, which is commonly supported by the use of business process models. As every compliance rule corresponds with a typical structure, the detection of those corresponds to a pattern matching problem. More specifically, we encounter the problem of subgraph isomorphism. In this paper we propose an automatic bus...
متن کاملAn Ontological Approach for Modeling Technical Standards for Compliance Checking
This paper gives an overview of a formal semantic-based approach of modeling some regulations in the photovoltaic field to help the delivering of technical assessments at the French scientific center on Building Industry (CSTB). Starting from regulatory texts, we first explicit SBVR rules and then formalize them into ontology-based rules in the SPARQL language. These are exploited in the modeli...
متن کاملNorm compliance checking
In multi-agent systems, norms are used to regulate agents’ behavior so that the objectives of the systems can be realized in a predictable way. Therefore, it is important to check whether agents can comply with the norms imposed on them. However, when norms are interrelated, verification of norm compliance cannot be achieved by checking compliance of each norm separately as done traditionally. ...
متن کاملChecking Security Policy Compliance
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology And Control
سال: 2019
ISSN: 2335-884X,1392-124X
DOI: 10.5755/j01.itc.48.2.21724