skip to main content
10.1145/1998441.1998463acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
demonstration

Security validation tool for business processes

Published: 15 June 2011 Publication History

Abstract

To evaluate whether a business process (BP) under-design enjoys certain security desiderata is hardly manageable by business analysts without a proper tool support, as the BP runtime environment is highly dynamic, e.g., delegation. We describe a novel security validation tool for BPs that employs model checking for evaluating security-relevant aspects of BPs in dynamic environments and offers accessible user interfaces and apprehensive feedback for business analysts. As proof-of-concept we integrate our tool within SAP NetWeaver Business Process Management.

Reference

[1]
Arsac, W., Compagna, L., Pellegrino, G., Ponta, S.E.: Security validation of business processes via model-checking. In: Proc. of the Third International Symposium on Engineering Secure Software and Systems (ESSoS 2011). Volume 6542 of Lecture Notes in Comput. Sci., Springer (2011) 29--42

Cited By

View all
  • (2013)The SPaCIoS ProjectProceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation10.1109/ICST.2013.75(497-498)Online publication date: 18-Mar-2013
  • (2013)Business Process Compliance via Security Validation as a ServiceProceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation10.1109/ICST.2013.63(455-462)Online publication date: 18-Mar-2013
  • (2012)Resilience to Leaking — Dynamic Systems Modeling of Information SecurityPLoS ONE10.1371/journal.pone.00498047:12(e49804)Online publication date: 5-Dec-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '11: Proceedings of the 16th ACM symposium on Access control models and technologies
June 2011
196 pages
ISBN:9781450306881
DOI:10.1145/1998441

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automatic security analysis
  2. business process
  3. model checking

Qualifiers

  • Demonstration

Conference

SACMAT '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2013)The SPaCIoS ProjectProceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation10.1109/ICST.2013.75(497-498)Online publication date: 18-Mar-2013
  • (2013)Business Process Compliance via Security Validation as a ServiceProceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation10.1109/ICST.2013.63(455-462)Online publication date: 18-Mar-2013
  • (2012)Resilience to Leaking — Dynamic Systems Modeling of Information SecurityPLoS ONE10.1371/journal.pone.00498047:12(e49804)Online publication date: 5-Dec-2012
  • (2012)Automated validation of trust and security of service-oriented architectures with the AVANTSSAR platform2012 International Conference on High Performance Computing & Simulation (HPCS)10.1109/HPCSim.2012.6266956(444-447)Online publication date: Jul-2012
  • (2012)The AVANTSSAR platform for the automated validation of trust and security of service-oriented architecturesProceedings of the 18th international conference on Tools and Algorithms for the Construction and Analysis of Systems10.1007/978-3-642-28756-5_19(267-282)Online publication date: 24-Mar-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media