Detective information flow analysis for business processes
dc.contributor.author | Accorsi, Rafael | |
dc.contributor.author | Wonnemann, Claus | |
dc.contributor.editor | Abramowicz, Witold | |
dc.contributor.editor | Maciaszek, Leszek | |
dc.contributor.editor | Kowalczyk, Ryszard | |
dc.contributor.editor | Speck, Andreas | |
dc.date.accessioned | 2019-06-03T12:25:21Z | |
dc.date.available | 2019-06-03T12:25:21Z | |
dc.date.issued | 2009 | |
dc.description.abstract | We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling a forensic investigation, our approach aims at analyzing the audit trails resultant from the execution of the business processes, locating informations flows that violate the (non-functional) requirements stipulated by security policies. The goal is to obtain fine-grained evidence of policy compliance with respect to information flows. | en |
dc.identifier.isbn | 978-3-88579-241-3 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/23231 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Business process, services – computing and intelligent service management | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-147 | |
dc.title | Detective information flow analysis for business processes | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 224 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 223 | |
gi.conference.date | March 23–25, 2009 | |
gi.conference.location | Leipzig | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1