Mostrar el registro sencillo del ítem

Ponencia

dc.creatorVarela Vaca, Ángel Jesúses
dc.creatorBorrego Núñez, Dianaes
dc.creatorGómez López, María Teresaes
dc.creatorMartínez Gasca, Rafaeles
dc.date.accessioned2022-10-24T07:24:41Z
dc.date.available2022-10-24T07:24:41Z
dc.date.issued2016
dc.identifier.citationVarela Vaca, Á.J., Borrego Núñez, D., Gómez López, M.T. y Martínez Gasca, R. (2016). A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models. En BIS 2016: 19th International Conference on Business Information Systems (289-301), Leipzig, Germany: Springer.
dc.identifier.isbn978-3-319-39425-1es
dc.identifier.issn1865-1348es
dc.identifier.urihttps://hdl.handle.net/11441/138256
dc.description.abstractArtifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity centric workflow description inadequate. Several artifact-centric initia tives pursue the verification of the structural and data perspectives of the models, but unfortunately uncovering security aspects. Security has become a crucial priority from the business and customer perspectives, and a complete verification procedure should also fulfill it. We propose an extension of artifact-centric process models based on the Usage Control Model which introduces mechanisms to specify security policies. An auto matic transformation is provided to enable the verification of enriched artifact-centric models using existing verification correctness algorithms.es
dc.description.sponsorshipMinisterio de Ciencia y Tecnología TIN2015-63502-C3-2-Res
dc.formatapplication/pdfes
dc.format.extent13es
dc.language.isoenges
dc.publisherSpringeres
dc.relation.ispartofBIS 2016: 19th International Conference on Business Information Systems (2016), pp. 289-301.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectArtifact-centric business process modeles
dc.subjectVerificationes
dc.subjectSecurityes
dc.subjectDeclarative security policyes
dc.subjectUsage control modeles
dc.titleA Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Modelses
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/submittedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticoses
dc.relation.projectIDTIN2015-63502-C3-2-Res
dc.relation.publisherversionhttps://link.springer.com/chapter/10.1007/978-3-319-39426-8_23es
dc.identifier.doi10.1007/978-3-319-39426-8_23es
dc.contributor.groupUniversidad de Sevilla. TIC-258: Data-centric Computing Research Hubes
dc.publication.initialPage289es
dc.publication.endPage301es
dc.eventtitleBIS 2016: 19th International Conference on Business Information Systemses
dc.eventinstitutionLeipzig, Germanyes
dc.relation.publicationplaceCham, Switzerlandes
dc.contributor.funderMinisterio de Ciencia Y Tecnología (MCYT). Españaes

FicherosTamañoFormatoVerDescripción
978-3-319-39426-8_23.pdf1.319MbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional