On the modeling and verification of security-aware and process-aware information systems

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many business processes are modeled as workflows, which often need to comply with business rules, legal requirements, and authorization policies. Workflow satisfiability is the problem of determining whether there exists a workflow instance that realizes the workflow specification while simultaneously complying with such constraints. Although this problem has been studied by the computer security community in the past, existing solutions are tailored for particular workflow models, so their applicability to other models or richer forms of analysis is questionable. We here investigate whether the satisfiability of formulas in an NP-complete fragment of linear-time temporal logic can serve as a more expressive and versatile tool for deciding the satisfiability of workflows. We also show that this fragment can solve this problem for a standard model from the literature. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Crampton, J., & Huth, M. (2012). On the modeling and verification of security-aware and process-aware information systems. In Lecture Notes in Business Information Processing (Vol. 100 LNBIP, pp. 423–434). Springer Verlag. https://doi.org/10.1007/978-3-642-28115-0_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free