Model checking authorization requirements in business processes
Business processes are usually expected to meet high level authorization requirements (e.g., Separation of Duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work...
Saved in:
| Published in: | Computers & security Vol. 40; pp. 1 - 22 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Amsterdam
Elsevier Ltd
01.02.2014
Elsevier Elsevier Sequoia S.A |
| Subjects: | |
| ISSN: | 0167-4048, 1872-6208 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Business processes are usually expected to meet high level authorization requirements (e.g., Separation of Duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work showed that model checking can be profitably used to check authorization requirements in business processes. However, building formal models that simultaneously account for both the workflow and the access control policy is a time consuming and error-prone activity. In this paper we present a new approach to model checking authorization requirements in business processes that allows for the separate specification of the workflow and of the associated access control policy while retaining the ability to carry out a fully automatic analysis of the business process. To illustrate the effectiveness of the approach we describe its application to a Loan Origination Process subject to an RBAC access control policy featuring conditional permission assignments and delegation. |
|---|---|
| AbstractList | Business processes are usually expected to meet high level authorization requirements (e.g., Separation of Duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work showed that model checking can be profitably used to check authorization requirements in business processes. However, building formal models that simultaneously account for both the workflow and the access control policy is a time consuming and error-prone activity. In this paper we present a new approach to model checking authorization requirements in business processes that allows for the separate specification of the workflow and of the associated access control policy while retaining the ability to carry out a fully automatic analysis of the business process. To illustrate the effectiveness of the approach we describe its application to a Loan Origination Process subject to an RBAC access control policy featuring conditional permission assignments and delegation. Business processes are usually expected to meet high level authorization requirements (e.g., Separation of Duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work showed that model checking can be profitably used to check authorization requirements in business processes. However, building formal models that simultaneously account for both the workflow and the access control policy is a time consuming and error-prone activity. In this paper we present a new approach to model checking authorization requirements in business processes that allows for the separate specification of the workflow and of the associated access control policy while retaining the ability to carry out a fully automatic analysis of the business process. To illustrate the effectiveness of the approach we describe its application to a Loan Origination Process subject to an RBAC access control policy featuring conditional permission assignments and delegation. [PUBLICATION ABSTRACT] |
| Author | Armando, Alessandro Ponta, Serena Elisa |
| Author_xml | – sequence: 1 givenname: Alessandro surname: Armando fullname: Armando, Alessandro email: alessandro.armando@unige.it organization: DIBRIS, Università di Genova, Viale Causa, 13, 16145 Genova, Italy – sequence: 2 givenname: Serena Elisa surname: Ponta fullname: Ponta, Serena Elisa email: serena.ponta@sap.com organization: SAP Research Sophia-Antipolis, Mougins, France |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28275163$$DView record in Pascal Francis |
| BookMark | eNqNkV9rFTEQxYNU8Lb6BXxaEMGXvebfJlkQRIpWoaUv9TlksxOb696kzewK-unN9taXPtQ-zTD8zhlmzjE5SjkBIa8Z3TLK1Pvd1meELadM1MGWUv6MbJjRvFWcmiOyqZBuJZXmBTlG3FHKtDJmQz5e5BGmxl-D_xnTj8Yt83Uu8Y-bY05NgdslFthDmrGJqRkWjAkQm5uSfa2AL8nz4CaEV_f1hHz_8vnq9Gt7fnn27fTTeetlp-cWlOOgGSgB2tHBBx1YGMF4EURXGxbkIIMKlGozgpAsDN2gpBq974YwBHFC3h186-bbBXC2-4gepsklyAvaep7uhZI9-z_aSSZ51_f6Caio72XMrK5vHqC7vJRUb7ZM9nVvb7So1Nt7yqF3Uygu-Yj2psS9K78tN1x3TK2cOXC-ZMQCwfo43_18Li5OllG75mp3ds3Vrrmus5prlfIH0n_uj4o-HERQM_oVoVj0EZKHscbrZzvm-Jj8L7dVvjA |
| CODEN | CPSEDU |
| CitedBy_id | crossref_primary_10_1016_j_cose_2023_103294 crossref_primary_10_1016_j_cose_2023_103621 crossref_primary_10_1007_s11704_016_6016_2 crossref_primary_10_1109_TSMC_2024_3373567 crossref_primary_10_1109_TKDE_2024_3373562 crossref_primary_10_1109_TDSC_2020_2975163 crossref_primary_10_1109_TSC_2023_3268651 crossref_primary_10_3390_computers13110274 crossref_primary_10_1108_JM2_03_2020_0077 crossref_primary_10_1155_2021_6610795 crossref_primary_10_1109_TDSC_2020_3012729 crossref_primary_10_1016_j_jsc_2016_07_008 crossref_primary_10_1109_TR_2023_3235785 crossref_primary_10_1109_TDSC_2023_3248602 crossref_primary_10_1109_TSMC_2019_2954589 crossref_primary_10_1109_TKDE_2021_3124271 |
| Cites_doi | 10.1007/11513988_27 10.3233/JCS-2008-16101 10.1007/s10922-004-0674-3 10.1109/32.588521 10.1145/300830.300837 10.1109/2.485845 |
| ContentType | Journal Article |
| Copyright | 2013 Elsevier Ltd 2015 INIST-CNRS Copyright Elsevier Sequoia S.A. Feb 2014 |
| Copyright_xml | – notice: 2013 Elsevier Ltd – notice: 2015 INIST-CNRS – notice: Copyright Elsevier Sequoia S.A. Feb 2014 |
| DBID | AAYXX CITATION IQODW 7SC 8FD JQ2 K7. L7M L~C L~D |
| DOI | 10.1016/j.cose.2013.10.002 |
| DatabaseName | CrossRef Pascal-Francis Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts Computer and Information Systems Abstracts ProQuest Criminal Justice (Alumni) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Applied Sciences Business Economics |
| EISSN | 1872-6208 |
| EndPage | 22 |
| ExternalDocumentID | 3207845241 28275163 10_1016_j_cose_2013_10_002 S0167404813001429 |
| Genre | Feature |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD BNPGV IQODW SSH 7SC 8FD JQ2 K7. L7M L~C L~D |
| ID | FETCH-LOGICAL-c457t-e6a2e71e63e7a0bcf7f1fde8c3f35fde1f4b4f6f0078de341fb5b646dcc5bfbf3 |
| ISICitedReferencesCount | 19 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000331482500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-4048 |
| IngestDate | Wed Oct 01 12:51:29 EDT 2025 Sat Sep 27 17:17:18 EDT 2025 Sat Sep 27 18:16:12 EDT 2025 Thu Nov 20 01:15:34 EST 2025 Wed Apr 02 07:25:23 EDT 2025 Sat Nov 29 05:55:40 EST 2025 Tue Nov 18 22:43:40 EST 2025 Fri Feb 23 02:33:36 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Access control Model checking Authorization requirements Security-sensitive business process Organizational control Automatic security analysis Groupware Legislation Workflow Integrated management Delegation Program verification Role-based access control Business process Loan Duty separation Formal specification Static analysis Licence procedure Firm management Automatic analysis Computer security |
| Language | English |
| License | CC BY 4.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c457t-e6a2e71e63e7a0bcf7f1fde8c3f35fde1f4b4f6f0078de341fb5b646dcc5bfbf3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 ObjectType-Article-1 ObjectType-Feature-2 |
| PQID | 1494919873 |
| PQPubID | 23500 |
| PageCount | 22 |
| ParticipantIDs | proquest_miscellaneous_1677936491 proquest_miscellaneous_1541425997 proquest_miscellaneous_1531011181 proquest_journals_1494919873 pascalfrancis_primary_28275163 crossref_citationtrail_10_1016_j_cose_2013_10_002 crossref_primary_10_1016_j_cose_2013_10_002 elsevier_sciencedirect_doi_10_1016_j_cose_2013_10_002 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-02-01 |
| PublicationDateYYYYMMDD | 2014-02-01 |
| PublicationDate_xml | – month: 02 year: 2014 text: 2014-02-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Computers & security |
| PublicationYear | 2014 |
| Publisher | Elsevier Ltd Elsevier Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier – name: Elsevier Sequoia S.A |
| References | Knorr, Weidner (bib35) 2001 Schaad A, Sohr K, Drouineaud M, A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes. J Inform Assur Secur; 2(1):55–67. Biere (bib14) 2009; vol. 185 Armando, Ponta (bib3) 2010; vol. 5983 Frau, Gorrieri, Ferigato (bib23) 2008; vol. 5491 Giunchiglia, Lifschitz (bib25) 1998 OMG (bib37) 2009 Scholer S, Zink O, Galileo Press; 2009. URL Guelev, Ryan, Schobbens (bib26) 2004; vol. 3225 Keen, Bahy, Croson, Garratt, Karchner, Lehmann (bib33) 2007 Jensen, Kristensen (bib32) 2009 Armando, Basin, Boichut, Chevalier, Compagna, Cuellar (bib4) 2005 Heilig, Karch (bib28) 2004 Heilig L, Karch S, Bottcher O, Mutzig C, Weber J, Pfennig R, Galileo Press; 2008. URL Armando, Carbone, Compagna (bib5) 2007 Armando, Compagna (bib2) 2007 Bertino, Ferrari, Atluri (bib11) 1999; 2 SAP (bib41) 2011 Crampton (bib19) 2005 Kesten, Pnueli, Raviv (bib34) 1998 Yi, Yong, Weinong (bib46) 2004; 12 Cerone, Xiangpeng, Krishnan (bib15) June 2006 Atluri, Warner (bib9) 2005 Giorgini, Massacci, Mylopoulos, Zannone (bib24) 2005 Heilig (bib27) 2010 OASIS (bib36) April 2007 Peterson (bib38) 1981 Schaad, Lotz, Sohr (bib42) 2006 Basin, Burri, Karjoth (bib10) 2009; vol. 5789 Hewett, Kijsanayothin, Thipse (bib30) 2008 Crampton, Khambhammettu (bib18) 2006 Arsac, Compagna, Pellegrino, Ponta (bib8) 2011; vol. 6542 Zhang, Ryan, Guelev (bib47) 2008; 16 Armando, Arsac, Avanesov, Barletta, Calvi, Cappai (bib7) 2012 de Moura, Owre, Rueß, Rushby, Shankar, Sorea (bib20) 2004; vol. 3114 Clark, Wilson (bib17) 1987 . Holzmann (bib31) 1997; 23 Armando, Carbone, Compagna, Cuéllar, Tobarra (bib6) 2008 Dury, Boroday, Petrenko, Lotz (bib21) 2007 Biere, Cimatti, Clarke, Zhu (bib13) 1999; vol. 1579 Rakkay, Boucheneb (bib39) 2009; 5430 Sandhu, Coyne, Feinstein, Youman (bib40) 1996; 29 Cimatti, Clarke, Giunchiglia, Giunchiglia, Pistore, Roveri (bib16) 2002; vol. 2404 Wolter, Miseldine, Meinel (bib45) 2009 Armando, Compagna (bib1) 2004; vol. 3229 Ferraris, Giunchiglia (bib22) 2000 Bertino, Crampton, Paci (bib12) 2006 Armando (10.1016/j.cose.2013.10.002_bib6) 2008 10.1016/j.cose.2013.10.002_bib29 Sandhu (10.1016/j.cose.2013.10.002_bib40) 1996; 29 Biere (10.1016/j.cose.2013.10.002_bib13) 1999; vol. 1579 Holzmann (10.1016/j.cose.2013.10.002_bib31) 1997; 23 Bertino (10.1016/j.cose.2013.10.002_bib11) 1999; 2 Hewett (10.1016/j.cose.2013.10.002_bib30) 2008 Armando (10.1016/j.cose.2013.10.002_bib3) 2010; vol. 5983 Cerone (10.1016/j.cose.2013.10.002_bib15) 2006 Clark (10.1016/j.cose.2013.10.002_bib17) 1987 Basin (10.1016/j.cose.2013.10.002_bib10) 2009; vol. 5789 Heilig (10.1016/j.cose.2013.10.002_bib28) 2004 Keen (10.1016/j.cose.2013.10.002_bib33) 2007 Armando (10.1016/j.cose.2013.10.002_bib2) 2007 Arsac (10.1016/j.cose.2013.10.002_bib8) 2011; vol. 6542 Biere (10.1016/j.cose.2013.10.002_bib14) 2009; vol. 185 OASIS (10.1016/j.cose.2013.10.002_bib36) 2007 Peterson (10.1016/j.cose.2013.10.002_bib38) 1981 Rakkay (10.1016/j.cose.2013.10.002_bib39) 2009; 5430 SAP (10.1016/j.cose.2013.10.002_bib41) 2011 Armando (10.1016/j.cose.2013.10.002_bib4) 2005 Crampton (10.1016/j.cose.2013.10.002_bib19) 2005 Giunchiglia (10.1016/j.cose.2013.10.002_bib25) 1998 Wolter (10.1016/j.cose.2013.10.002_bib45) 2009 Atluri (10.1016/j.cose.2013.10.002_bib9) 2005 Kesten (10.1016/j.cose.2013.10.002_bib34) 1998 Ferraris (10.1016/j.cose.2013.10.002_bib22) 2000 Giorgini (10.1016/j.cose.2013.10.002_bib24) 2005 Schaad (10.1016/j.cose.2013.10.002_bib42) 2006 Cimatti (10.1016/j.cose.2013.10.002_bib16) 2002; vol. 2404 Yi (10.1016/j.cose.2013.10.002_bib46) 2004; 12 Knorr (10.1016/j.cose.2013.10.002_bib35) 2001 Armando (10.1016/j.cose.2013.10.002_bib1) 2004; vol. 3229 Armando (10.1016/j.cose.2013.10.002_bib5) 2007 Zhang (10.1016/j.cose.2013.10.002_bib47) 2008; 16 Frau (10.1016/j.cose.2013.10.002_bib23) 2008; vol. 5491 Crampton (10.1016/j.cose.2013.10.002_bib18) 2006 de Moura (10.1016/j.cose.2013.10.002_bib20) 2004; vol. 3114 Heilig (10.1016/j.cose.2013.10.002_bib27) 2010 Armando (10.1016/j.cose.2013.10.002_bib7) 2012 Dury (10.1016/j.cose.2013.10.002_bib21) 2007 Jensen (10.1016/j.cose.2013.10.002_bib32) 2009 10.1016/j.cose.2013.10.002_bib44 Bertino (10.1016/j.cose.2013.10.002_bib12) 2006 10.1016/j.cose.2013.10.002_bib43 OMG (10.1016/j.cose.2013.10.002_bib37) 2009 Guelev (10.1016/j.cose.2013.10.002_bib26) 2004; vol. 3225 |
| References_xml | – volume: vol. 6542 start-page: 29 year: 2011 end-page: 42 ident: bib8 article-title: Security validation of business processes via model-checking publication-title: ESSoS – volume: vol. 5491 start-page: 210 year: 2008 end-page: 225 ident: bib23 article-title: Petri net security checker: structural non-interference at work publication-title: Formal aspects in security and trust – start-page: 1 year: 2009 end-page: 15 ident: bib45 article-title: Verification of business process entailment constraints using SPIN publication-title: ESSoS – start-page: 623 year: 1998 end-page: 630 ident: bib25 article-title: An action language based on causal explanation: preliminary report publication-title: Proc. AAAI-98 – volume: vol. 185 start-page: 457 year: 2009 end-page: 481 ident: bib14 article-title: Bounded model checking publication-title: Handbook of satisfiability – year: June 2006 ident: bib15 article-title: Modelling and resource allocation planning of BPEL workflows under security constraints – year: 2009 ident: bib37 article-title: Business process modeling notation (BPMN) – volume: vol. 2404 start-page: 359 year: 2002 end-page: 364 ident: bib16 article-title: NuSMV 2: an opensource tool for symbolic model checking publication-title: 14th international conference on computer aided verification (CAV 2002) – volume: 29 start-page: 38 year: 1996 end-page: 47 ident: bib40 article-title: Role-based access control models publication-title: Computer – volume: vol. 3229 start-page: 730 year: 2004 end-page: 733 ident: bib1 article-title: SATMC: a SAT-based model checker for security protocols publication-title: JELIA'04 – start-page: 1 year: 2008 end-page: 10 ident: bib6 article-title: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps publication-title: Proceedings of the 6th ACM workshop on formal methods in security engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008 – start-page: 267 year: 2012 end-page: 282 ident: bib7 article-title: The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures publication-title: Proceedings of the 18th international conference on tools and algorithms for the construction and analysis of systems (TACAS) – start-page: 275 year: 2006 end-page: 284 ident: bib12 article-title: Access control and authorization constraints for WS-BPEL publication-title: ICWS – start-page: 102 year: 2001 end-page: 114 ident: bib35 article-title: Analyzing separation of duties in Petri net workflows publication-title: MMM-ACNS '01: proceedings of the international workshop on information assurance in computer networks – start-page: 38 year: 2005 end-page: 47 ident: bib19 article-title: A reference monitor for workflow systems with constrained task execution publication-title: SACMAT 2005, 10th ACM symposium on access control models and technologies, Stockholm, Sweden, June 1–3, 2005, Proceedings – start-page: 748 year: 2000 end-page: 753 ident: bib22 article-title: Planning as satisfiability in nondeterministic domains publication-title: Proc. of the seventeenth national conference on artificial intelligence and twelfth conference on innovative applications of artificial intelligence – year: 2007 ident: bib2 article-title: SAT-based model-checking for security protocols analysis publication-title: International Journal of Information Security – reference: Schaad A, Sohr K, Drouineaud M, A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes. J Inform Assur Secur; 2(1):55–67. – volume: vol. 5983 start-page: 66 year: 2010 end-page: 80 ident: bib3 article-title: Model checking of security-sensitive business processes publication-title: Formal aspects in security and trust, 6th international workshop, FAST09 – start-page: 174 year: 2006 end-page: 191 ident: bib18 article-title: Delegation in role-based access control publication-title: ESORICS'06 – reference: Heilig L, Karch S, Bottcher O, Mutzig C, Weber J, Pfennig R, Galileo Press; 2008. URL: – volume: vol. 5789 start-page: 250 year: 2009 end-page: 267 ident: bib10 article-title: Dynamic enforcement of abstract separation of duty constraints publication-title: Computer security – ESORICS 2009, 14th European symposium on research in computer security, Saint-Malo, France, September 21–23, 2009. Proceedings – year: April 2007 ident: bib36 article-title: Web services business process execution language version 2.0 – volume: 5430 start-page: 149 year: 2009 end-page: 176 ident: bib39 article-title: Security analysis of role based access control models using colored Petri nets and CPNtools publication-title: Trans Comput Sci – volume: vol. 3114 start-page: 496 year: 2004 end-page: 500 ident: bib20 article-title: Sal 2 publication-title: Proc. of 16th international conference on computer aided verification (CAV 2004) – volume: 2 start-page: 65 year: 1999 end-page: 104 ident: bib11 article-title: The specification and enforcement of authorization constraints in workflow management systems publication-title: ACM Trans Inf Syst Secur – year: 2010 ident: bib27 article-title: Understanding SAP Netweaver identity management – volume: vol. 1579 start-page: 193 year: 1999 end-page: 207 ident: bib13 article-title: Symbolic model checking without BDDs publication-title: Proceedings of TACAS'99 – year: 2005 ident: bib4 article-title: The AVISPA tool for the automated validation of Internet security protocols and applications publication-title: CAV'05 – year: 2004 ident: bib28 article-title: SAP Netweaver – start-page: 139 year: 2006 end-page: 149 ident: bib42 article-title: A model-checking approach to analysing organisational controls in a loan origination process publication-title: SACMAT 2006,11th ACM symposium on access control models and technologies, Lake Tahoe, California, USA, June 7–9, 2006, Proceedings – start-page: 201 year: 2007 end-page: 210 ident: bib21 article-title: Formal verification of business workflows and role based access control systems publication-title: SECUREWARE '07 – start-page: 167 year: 2005 end-page: 176 ident: bib24 article-title: Modeling security requirements through ownership, permission and delegation publication-title: Requirements engineering, 2005. Proceedings. 13th IEEE international conference on – start-page: 1 year: 1998 end-page: 16 ident: bib34 article-title: Algorithmic verification of linear temporal logic specifications publication-title: ICALP – year: 1981 ident: bib38 article-title: Petri net theory and the modeling of systems – start-page: 49 year: 2005 end-page: 58 ident: bib9 article-title: Supporting conditional delegation in secure workflow management systems publication-title: SACMAT '05 – volume: vol. 3225 start-page: 219 year: 2004 end-page: 230 ident: bib26 article-title: Model-checking access control policies publication-title: ISC – year: 2011 ident: bib41 article-title: SAP Netweaver business process management – year: 1987 ident: bib17 article-title: A comparison of commercial and military security policies publication-title: Proc. IEEE symp. on security and privacy, Washington DC – reference: . – volume: 23 start-page: 279 year: 1997 end-page: 295 ident: bib31 article-title: The model checker SPIN publication-title: Softw Eng – volume: 16 start-page: 1 year: 2008 end-page: 61 ident: bib47 article-title: Synthesising verified access control systems through model checking publication-title: J Comput Secur – start-page: 765 year: 2008 end-page: 770 ident: bib30 article-title: Security analysis of role-based separation of duty with workflows publication-title: Proceedings of the third international conference on availability, reliability and security (ARES 2008) – reference: Scholer S, Zink O, Galileo Press; 2009. URL: – volume: 12 start-page: 507 year: 2004 end-page: 535 ident: bib46 article-title: Modeling and analyzing of workflow authorization management publication-title: J Netw Syst Manage – year: 2007 ident: bib33 article-title: Human-centric business process management with WebSphere Process Server V6 – start-page: 385 year: 2007 end-page: 396 ident: bib5 article-title: LTL model checking for security protocols publication-title: CSF-20 – year: 2009 ident: bib32 article-title: Coloured Petri Nets: modeling and validation of concurrent system – volume: vol. 3229 start-page: 730 year: 2004 ident: 10.1016/j.cose.2013.10.002_bib1 article-title: SATMC: a SAT-based model checker for security protocols – year: 2004 ident: 10.1016/j.cose.2013.10.002_bib28 – year: 2007 ident: 10.1016/j.cose.2013.10.002_bib36 – start-page: 623 year: 1998 ident: 10.1016/j.cose.2013.10.002_bib25 article-title: An action language based on causal explanation: preliminary report – year: 2009 ident: 10.1016/j.cose.2013.10.002_bib37 – start-page: 1 year: 2009 ident: 10.1016/j.cose.2013.10.002_bib45 article-title: Verification of business process entailment constraints using SPIN – start-page: 174 year: 2006 ident: 10.1016/j.cose.2013.10.002_bib18 article-title: Delegation in role-based access control – start-page: 139 year: 2006 ident: 10.1016/j.cose.2013.10.002_bib42 article-title: A model-checking approach to analysing organisational controls in a loan origination process – volume: vol. 6542 start-page: 29 year: 2011 ident: 10.1016/j.cose.2013.10.002_bib8 article-title: Security validation of business processes via model-checking – start-page: 765 year: 2008 ident: 10.1016/j.cose.2013.10.002_bib30 article-title: Security analysis of role-based separation of duty with workflows doi: 10.1007/11513988_27 – start-page: 385 year: 2007 ident: 10.1016/j.cose.2013.10.002_bib5 article-title: LTL model checking for security protocols – start-page: 38 year: 2005 ident: 10.1016/j.cose.2013.10.002_bib19 article-title: A reference monitor for workflow systems with constrained task execution – start-page: 267 year: 2012 ident: 10.1016/j.cose.2013.10.002_bib7 article-title: The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures – year: 2006 ident: 10.1016/j.cose.2013.10.002_bib15 – year: 2010 ident: 10.1016/j.cose.2013.10.002_bib27 – start-page: 748 year: 2000 ident: 10.1016/j.cose.2013.10.002_bib22 article-title: Planning as satisfiability in nondeterministic domains – volume: 16 start-page: 1 issue: 1 year: 2008 ident: 10.1016/j.cose.2013.10.002_bib47 article-title: Synthesising verified access control systems through model checking publication-title: J Comput Secur doi: 10.3233/JCS-2008-16101 – year: 2007 ident: 10.1016/j.cose.2013.10.002_bib2 article-title: SAT-based model-checking for security protocols analysis – volume: vol. 2404 start-page: 359 year: 2002 ident: 10.1016/j.cose.2013.10.002_bib16 article-title: NuSMV 2: an opensource tool for symbolic model checking – year: 2007 ident: 10.1016/j.cose.2013.10.002_bib33 – start-page: 167 year: 2005 ident: 10.1016/j.cose.2013.10.002_bib24 article-title: Modeling security requirements through ownership, permission and delegation – start-page: 1 year: 1998 ident: 10.1016/j.cose.2013.10.002_bib34 article-title: Algorithmic verification of linear temporal logic specifications – start-page: 1 year: 2008 ident: 10.1016/j.cose.2013.10.002_bib6 article-title: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps – ident: 10.1016/j.cose.2013.10.002_bib43 – start-page: 102 year: 2001 ident: 10.1016/j.cose.2013.10.002_bib35 article-title: Analyzing separation of duties in Petri net workflows – volume: 12 start-page: 507 issue: 4 year: 2004 ident: 10.1016/j.cose.2013.10.002_bib46 article-title: Modeling and analyzing of workflow authorization management publication-title: J Netw Syst Manage doi: 10.1007/s10922-004-0674-3 – volume: vol. 3225 start-page: 219 year: 2004 ident: 10.1016/j.cose.2013.10.002_bib26 article-title: Model-checking access control policies – volume: 23 start-page: 279 issue: 5 year: 1997 ident: 10.1016/j.cose.2013.10.002_bib31 article-title: The model checker SPIN publication-title: Softw Eng doi: 10.1109/32.588521 – volume: vol. 185 start-page: 457 year: 2009 ident: 10.1016/j.cose.2013.10.002_bib14 article-title: Bounded model checking – year: 2011 ident: 10.1016/j.cose.2013.10.002_bib41 – start-page: 49 year: 2005 ident: 10.1016/j.cose.2013.10.002_bib9 article-title: Supporting conditional delegation in secure workflow management systems – year: 1987 ident: 10.1016/j.cose.2013.10.002_bib17 article-title: A comparison of commercial and military security policies – volume: vol. 5491 start-page: 210 year: 2008 ident: 10.1016/j.cose.2013.10.002_bib23 article-title: Petri net security checker: structural non-interference at work – volume: 2 start-page: 65 issue: 1 year: 1999 ident: 10.1016/j.cose.2013.10.002_bib11 article-title: The specification and enforcement of authorization constraints in workflow management systems publication-title: ACM Trans Inf Syst Secur doi: 10.1145/300830.300837 – volume: vol. 1579 start-page: 193 year: 1999 ident: 10.1016/j.cose.2013.10.002_bib13 article-title: Symbolic model checking without BDDs – volume: 5430 start-page: 149 issue: 4 year: 2009 ident: 10.1016/j.cose.2013.10.002_bib39 article-title: Security analysis of role based access control models using colored Petri nets and CPNtools publication-title: Trans Comput Sci – start-page: 201 year: 2007 ident: 10.1016/j.cose.2013.10.002_bib21 article-title: Formal verification of business workflows and role based access control systems – year: 1981 ident: 10.1016/j.cose.2013.10.002_bib38 – volume: 29 start-page: 38 issue: 2 year: 1996 ident: 10.1016/j.cose.2013.10.002_bib40 article-title: Role-based access control models publication-title: Computer doi: 10.1109/2.485845 – start-page: 275 year: 2006 ident: 10.1016/j.cose.2013.10.002_bib12 article-title: Access control and authorization constraints for WS-BPEL – volume: vol. 3114 start-page: 496 year: 2004 ident: 10.1016/j.cose.2013.10.002_bib20 article-title: Sal 2 – volume: vol. 5789 start-page: 250 year: 2009 ident: 10.1016/j.cose.2013.10.002_bib10 article-title: Dynamic enforcement of abstract separation of duty constraints – ident: 10.1016/j.cose.2013.10.002_bib29 – ident: 10.1016/j.cose.2013.10.002_bib44 – year: 2005 ident: 10.1016/j.cose.2013.10.002_bib4 article-title: The AVISPA tool for the automated validation of Internet security protocols and applications – year: 2009 ident: 10.1016/j.cose.2013.10.002_bib32 – volume: vol. 5983 start-page: 66 year: 2010 ident: 10.1016/j.cose.2013.10.002_bib3 article-title: Model checking of security-sensitive business processes |
| SSID | ssj0017688 |
| Score | 2.1339898 |
| Snippet | Business processes are usually expected to meet high level authorization requirements (e.g., Separation of Duty). Since violation of authorization requirements... |
| SourceID | proquest pascalfrancis crossref elsevier |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 1 |
| SubjectTerms | Access Access control Applied sciences Authorization Authorization requirements Authorizations Automatic security analysis Business Computer science; control theory; systems Computer systems and distributed systems. User interface Computer systems performance. Reliability Delegation Economics Exact sciences and technology Information systems. Data bases Loan originations Loans Mathematical models Memory and file management (including protection and security) Memory organisation. Data processing Model checking Organizational control Organizational effectiveness Permission Policies Requirements analysis Security-sensitive business process Software Specification Specifications Studies Time use Workflow |
| Title | Model checking authorization requirements in business processes |
| URI | https://dx.doi.org/10.1016/j.cose.2013.10.002 https://www.proquest.com/docview/1494919873 https://www.proquest.com/docview/1531011181 https://www.proquest.com/docview/1541425997 https://www.proquest.com/docview/1677936491 |
| Volume | 40 |
| WOSCitedRecordID | wos000331482500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLegQ4CE-CggCmMKEjtVnZrEie0TmqAVoKpw6KTeotixtY7JDXWL9ufzHNtpx0Q1DlyiyHHiyL_n92G_D4TeJ5kgmRR8UEmwTXCFgQ9WhNjMiGmME05F2VQtmZDplM7n7LuvTGeacgJEa3p1xer_CjW0Adg2dPYf4G4_Cg1wD6DDFWCH662At9XNLvuAhfjRBCBu1ufLlY-27K-k9fyVLq5toUMNStOvXcCA9ygMqQt8yQfTEIjxpe52aKTUVQiTMaa0uQ9aVrvUTi-1jsS6tO5jptzdYohx8Ere7jra5OhDlxIzsE2XZcnzvXhHgLo44xus2e0SXJxYP3zrUpeeNF51yVYQhcP36bdifDaZFLPRfHacjuufA1skzB6mH6efHGB30UFCMkY76OD0y2j-tT04AuuJtunc4Y99nJRz6ftz6L_pIo_q0sAKUa60yQ0p3ages6fosbcZolOH9TN0R-ouuh9CFrroScAp8py6ix6EgHPzHH1oKCIKFBFdo4holyKihY4CRUQtRbxAZ-PR7OPnga-bMRA4I-uBzMtEkljmqSTlkAtFVKwqSUWq0gxuYoU5Vrmy6mElQY1RPOM5zishMq64Sl-ijl5q-QpFdIgFlSnjqUowzSvKSpbEmMeUU8xZ3ENxmMFC-KTytrbJZRG8By8KO-uFnXXbBrPeQ_32ndqlVNnbOwvAFF4pdMpeAYS1972jayi2QyUUKAeskB46DLAWfvkaMIQZZnYfDh6_ax8Dx7XHaKWWyw30AbEFUhFU4319MHC6jDGyp09OQDjmMN7rW3znDXq4XZqHqLNebeRbdE_8Wi_M6sgvg9_-Tr0G |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Model+checking+authorization+requirements+in+business+processes&rft.jtitle=Computers+%26+security&rft.au=Armando%2C+Alessandro&rft.au=Ponta%2C+Serena+Elisa&rft.date=2014-02-01&rft.issn=0167-4048&rft.volume=40&rft.spage=1&rft.epage=22&rft_id=info:doi/10.1016%2Fj.cose.2013.10.002&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |