Modern information systems are large-sized and comprise multiple heterogeneous and autonomous components. Autonomy enables decentralization, but it also implies that components providers are free to change, retire, or introduce new components. This is a threat to security, and calls for a continuous verification process to ensure compliance with security policies. Existing verification frameworks either have limited expressiveness-thereby inhibiting the specification of real-world requirements-, or rely on formal languages that are hardly employable for modeling and verifying large systems. In this paper, we overcome the limitations of existing approaches by proposing a framework that enables: (1) specifying information systems in SecBPMN, a security-oriented extension of BPMN; (2) expressing security policies through SecBPMN-Q, a query language for representing security policies; and (3) verifying SecBPMN-Q against SecBPMN specifications via an implemented query engine. We report on the applicability of our approach via a case study about air traffic management. © Springer-Verlag Berlin Heidelberg 2014.

(2014). Modeling and verifying security policies in business processes . Retrieved from https://hdl.handle.net/10446/324017

Modeling and verifying security policies in business processes

Salnitri,Mattia;
2014-01-01

Abstract

Modern information systems are large-sized and comprise multiple heterogeneous and autonomous components. Autonomy enables decentralization, but it also implies that components providers are free to change, retire, or introduce new components. This is a threat to security, and calls for a continuous verification process to ensure compliance with security policies. Existing verification frameworks either have limited expressiveness-thereby inhibiting the specification of real-world requirements-, or rely on formal languages that are hardly employable for modeling and verifying large systems. In this paper, we overcome the limitations of existing approaches by proposing a framework that enables: (1) specifying information systems in SecBPMN, a security-oriented extension of BPMN; (2) expressing security policies through SecBPMN-Q, a query language for representing security policies; and (3) verifying SecBPMN-Q against SecBPMN specifications via an implemented query engine. We report on the applicability of our approach via a case study about air traffic management. © Springer-Verlag Berlin Heidelberg 2014.
2014
Inglese
Enterprise, Business-Process and Information Systems Modeling. 15th International Conference, BPMDS 2014, 19th International Conference, EMMSAD 2014, Held at CAiSE 2014
978-3-662-43744-5
175
200
214
cartaceo
online
Switzerland
Springer
15th International Conference on Business Process Modeling, Development and Support, BPMDS 2014 and 19th International Conference on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2014; Thessaloniki, Greece, 16-17 june 2014
Thessaloniki (Greece)
16-17 june 2014
AIS-SIGSAND
Enterprise Architecture Network
International Federation for Information
ORM Foundation
Processing Working Group 8.1
Settore IINF-05/A - Sistemi di elaborazione delle informazioni
BPMN; Compliance; Information systems; Security policies
info:eu-repo/semantics/conferenceObject
3
Salnitri, Mattia; Dalpiaz, F.; Giorgini, P.
1.4 Contributi in atti di convegno - Contributions in conference proceedings::1.4.01 Contributi in atti di convegno - Conference presentations
reserved
Non definito
273
(2014). Modeling and verifying security policies in business processes . Retrieved from https://hdl.handle.net/10446/324017
File allegato/i alla scheda:
File Dimensione del file Formato  
FM + 2014+Modeling+and+Verifying+Security+Policies+in+Business+Processes.pdf

Solo gestori di archivio

Versione: postprint - versione referata/accettata senza referaggio
Licenza: Licenza default Aisberg
Dimensione del file 1.24 MB
Formato Adobe PDF
1.24 MB Adobe PDF   Visualizza/Apri
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/324017
Citazioni
  • Scopus 46
  • ???jsp.display-item.citation.isi??? ND
social impact