A usage control model extension for the verification of security policies in artifact-centric business process models

3Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activitycentric workflow description inadequate. Several artifact-centric initiatives pursue the verification of the structural and data perspectives of the models, but unfortunately uncovering security aspects. Security has become a crucial priority from the business and customer perspectives, and a complete verification procedure should also fulfill it. We propose an extension of artifact-centric process models based on the Usage Control Model which introduces mechanisms to specify security policies. An automatic transformation is provided to enable the verification of enriched artifact-centric models using existing verification correctness algorithms.

Cite

CITATION STYLE

APA

Varela-Vaca, Á. J., Borrego, D., Gómez-López, M. T., & Gasca, R. M. (2016). A usage control model extension for the verification of security policies in artifact-centric business process models. In Lecture Notes in Business Information Processing (Vol. 255, pp. 289–301). Springer Verlag. https://doi.org/10.1007/978-3-319-39426-8_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free