FORTES: Forensic Information Flow Analysis of Business Processes
نویسندگان
چکیده
From 06.04. to 09.04.2010, the Dagstuhl Seminar 10141 Distributed Usage Control was held in Schloss Dagstuhl Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The rst section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.
منابع مشابه
Forensic Leak Detection for Business Process Models
This paper presents a formal forensic technique based on information flow analysis to detect leaks in business processes models. The approach can be uniformly applied both for the analysis of process specifications and of the log files generated during processes’ execution. Specifically, the special Petri net dialect IFnet provides a common basis for the formalization of isolation properties, t...
متن کاملDetective Information Flow Analysis for Business Processes
We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling a forensic investigation, our approach aims at analyzing the audit trails resultant from the execution of the business processes, locating informations flows that violate the (non-functional) requirements stipulated by security...
متن کاملA Forensic Framework for Handling Information Privacy Incidents
This paper presents a framework designed to assist enterprises in implementing a forensic readiness capability for information privacy incidents. In particular, the framework provides guidance for specifying high-level policies, business processes and organizational functions, and for determining the device-level forensic procedures, standards and processes required to handle information privac...
متن کاملDigital Forensic Analysis on Runtime Instruction Flow
Computer system’s runtime information is an essential part of the digital evidence. Current digital forensic approaches mainly focus on memory and I/O data, while the runtime instructions from processes are often ignored. We present a novel approach on runtime instruction forensic analysis and have developed a forensic system which collects instruction flow and extracts digital evidence. The sy...
متن کاملInDico: Information Flow Analysis of Business Processes for Confidentiality Requirements
This paper presents InDico, an approach for the automated analysis of business processes against confidentiality requirements. InDico is motivated by the fact that in spite of the correct deployment of access control mechanisms, information leaks in automated business processes can persist due to erroneous process design. InDico employs a meta-model based on Petri nets to formalize and analyze ...
متن کامل