Information flow security for business process models - just one click away

A. Lehmann, D. Fahland

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

When outsourcing tasks of a business process to a third party, information flow security becomes a critical issue. In particular implicit information leaks are an intriguing problem. Given a business process one could ask whether the execution of a confidential task is kept secret to a third party which can observe some public (nonconfidential) tasks. A business process is secure in sense of implicit information flow if a third party can not deduce the execution of confidential tasks based on observations of public tasks. We will show that we can verify much faster whether a given process model is secure, support a new information flow property, and support the modeler to create a secure process using a graphical modeling tool. The demo might be interesting for all process modelers and those who are concerned with security in the BPM community.
Original languageEnglish
Title of host publicationProceedings of Demonstration Track of the 10th International Conference on Business Process Management (BPM Demos 2012, Tallinn, Estonia, September 4, 2012)
EditorsN. Lohmann, S. Moser
PublisherCEUR-WS.org
Pages34-39
Publication statusPublished - 2012
EventBPM 2012 Demonstration Track, September 4, 2012, Tallinn, Estonia - Tallinn, Estonia
Duration: 4 Sep 20124 Sep 2012

Publication series

NameCEUR Workshop Proceedings
Volume940
ISSN (Print)1613-0073

Other

OtherBPM 2012 Demonstration Track, September 4, 2012, Tallinn, Estonia
Country/TerritoryEstonia
CityTallinn
Period4/09/124/09/12
OtherDemonstration Track of the 10th International Conference on Business Process Management (BPM 2012)

Fingerprint

Dive into the research topics of 'Information flow security for business process models - just one click away'. Together they form a unique fingerprint.

Cite this