2015
DOI: 10.1016/j.is.2013.12.006
|View full text |Cite
|
Sign up to set email alerts
|

Information leak detection in business process models: Theory, application, and tool support

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
2

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 26 publications
0
9
0
2
Order By: Relevance
“…An extension of workflow nets to algebraic nets is used in [18], to reduce an information flow analysis to a check of the soundness property with the MAUDE model checker. While the previous both approaches focussed on the data flow, other side channels are considered for the more general problem of non-interference in [19]. This work extends previous work on information flow analysis [20]- [22], reducing the problem to reachability in Petri nets.…”
Section: A Information Flow Analysis For Business Processesmentioning
confidence: 78%
See 2 more Smart Citations
“…An extension of workflow nets to algebraic nets is used in [18], to reduce an information flow analysis to a check of the soundness property with the MAUDE model checker. While the previous both approaches focussed on the data flow, other side channels are considered for the more general problem of non-interference in [19]. This work extends previous work on information flow analysis [20]- [22], reducing the problem to reachability in Petri nets.…”
Section: A Information Flow Analysis For Business Processesmentioning
confidence: 78%
“…This work extends previous work on information flow analysis [20]- [22], reducing the problem to reachability in Petri nets. While the prior approaches required a full state space analysis, the more recent tooling in [19] exploits state space reduction techniques implemented in the LoLA model checker. In the same line of research also falls [23].…”
Section: A Information Flow Analysis For Business Processesmentioning
confidence: 99%
See 1 more Smart Citation
“…IRiS Analytics checks security vulnerabilities as dependencies of the given instance of the workflow 'Information exchange' between the participating IT systems as a Black Box [3] and, if necessary and possible, additionally their internal data traces with a White Box test scheme [17]. The former evaluation results in evidence INFOR-MATION ; the evaluation of the workflow instance results in evidence DATA TRACE .…”
Section: Iris: User-centered It Risk Analyticsmentioning
confidence: 99%
“…Розглядалось також застосування систем ЕДО в грід-середовищі [12]. Ряд робіт присвячений такому аспекту побудови СЕД, як її безпека [13].…”
Section: аналіз літературних даних і постановка проблемиunclassified