InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements

نویسندگان

  • Rafael Accorsi
  • Claus Wonnemann
چکیده

This paper presents InDico, an approach for the automated analysis of business processes against confidentiality requirements. InDico is motivated by the fact that in spite of the correct deployment of access control mechanisms, information leaks in automated business processes can persist due to erroneous process design. InDico employs a meta-model based on Petri nets to formalize and analyze business processes, thereby enabling the identification of leaks caused by a flawed process design.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Possibilistic Information Flow Control for Workflow Management Systems

In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty. Graphical notations exist for specifying both workflows and associated security requirements. We present an approach for formally verifying that a workflow satisfies such security requirements. For this purpose, we define the ...

متن کامل

Detective Information Flow Analysis for Business Processes

We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling a forensic investigation, our approach aims at analyzing the audit trails resultant from the execution of the business processes, locating informations flows that violate the (non-functional) requirements stipulated by security...

متن کامل

Information Flow Properties for Energy Management in a Smart Grid

Information flow security within the context of multilevel security deals with ways to avoid unwanted information flow from a high level domain to a low level domain. Several confidentiality and information flow properties have been formalized in literature. However, applying them to CyberPhysical Systems (CPSs) adds to the challenge of protecting confidentiality. This paper performs an informa...

متن کامل

Security Requirements of E-Business Processes

$EVWUDFW: This paper presents an open framework for the analysis of security requirements of business processes in electronic commerce. The most important dimensions of the framework are security objectives (confidentiality, integrity, availability, accountability), the phases of and the places/parties involved in the process. The approach is of open nature so that it can be adapted to the hete...

متن کامل

The Feasibility of Deploying Business Process Management in Hospitals in Iran

Background: Business process management systems (BPM) can automate all processes in an organization. These systems provide the possibility of identifying, modeling, deploying, implementing, function managing, integrating with other information systems, monitoring and improving an organization's business processes in a standard form. As far as the authors know, no related resear...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010