InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements
نویسندگان
چکیده
This paper presents InDico, an approach for the automated analysis of business processes against confidentiality requirements. InDico is motivated by the fact that in spite of the correct deployment of access control mechanisms, information leaks in automated business processes can persist due to erroneous process design. InDico employs a meta-model based on Petri nets to formalize and analyze business processes, thereby enabling the identification of leaks caused by a flawed process design.
منابع مشابه
Possibilistic Information Flow Control for Workflow Management Systems
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty. Graphical notations exist for specifying both workflows and associated security requirements. We present an approach for formally verifying that a workflow satisfies such security requirements. For this purpose, we define the ...
متن کاملDetective Information Flow Analysis for Business Processes
We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling a forensic investigation, our approach aims at analyzing the audit trails resultant from the execution of the business processes, locating informations flows that violate the (non-functional) requirements stipulated by security...
متن کاملInformation Flow Properties for Energy Management in a Smart Grid
Information flow security within the context of multilevel security deals with ways to avoid unwanted information flow from a high level domain to a low level domain. Several confidentiality and information flow properties have been formalized in literature. However, applying them to CyberPhysical Systems (CPSs) adds to the challenge of protecting confidentiality. This paper performs an informa...
متن کاملSecurity Requirements of E-Business Processes
$EVWUDFW: This paper presents an open framework for the analysis of security requirements of business processes in electronic commerce. The most important dimensions of the framework are security objectives (confidentiality, integrity, availability, accountability), the phases of and the places/parties involved in the process. The approach is of open nature so that it can be adapted to the hete...
متن کاملThe Feasibility of Deploying Business Process Management in Hospitals in Iran
Background: Business process management systems (BPM) can automate all processes in an organization. These systems provide the possibility of identifying, modeling, deploying, implementing, function managing, integrating with other information systems, monitoring and improving an organization's business processes in a standard form. As far as the authors know, no related resear...
متن کامل