dc.creator | Varela Vaca, Ángel Jesús | es |
dc.creator | Borrego Núñez, Diana | es |
dc.creator | Gómez López, María Teresa | es |
dc.creator | Martínez Gasca, Rafael | es |
dc.date.accessioned | 2022-10-24T07:24:41Z | |
dc.date.available | 2022-10-24T07:24:41Z | |
dc.date.issued | 2016 | |
dc.identifier.citation | Varela Vaca, Á.J., Borrego Núñez, D., Gómez López, M.T. y Martínez Gasca, R. (2016). A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models. En BIS 2016: 19th International Conference on Business Information Systems (289-301), Leipzig, Germany: Springer. | |
dc.identifier.isbn | 978-3-319-39425-1 | es |
dc.identifier.issn | 1865-1348 | es |
dc.identifier.uri | https://hdl.handle.net/11441/138256 | |
dc.description.abstract | Artifact-centric initiatives have been used in business
processes whose data management is complex, being the simple activity centric workflow description inadequate. Several artifact-centric initia tives pursue the verification of the structural and data perspectives of
the models, but unfortunately uncovering security aspects. Security has
become a crucial priority from the business and customer perspectives,
and a complete verification procedure should also fulfill it. We propose an
extension of artifact-centric process models based on the Usage Control
Model which introduces mechanisms to specify security policies. An auto matic transformation is provided to enable the verification of enriched
artifact-centric models using existing verification correctness algorithms. | es |
dc.description.sponsorship | Ministerio de Ciencia y Tecnología TIN2015-63502-C3-2-R | es |
dc.format | application/pdf | es |
dc.format.extent | 13 | es |
dc.language.iso | eng | es |
dc.publisher | Springer | es |
dc.relation.ispartof | BIS 2016: 19th International Conference on Business Information Systems (2016), pp. 289-301. | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Artifact-centric business process model | es |
dc.subject | Verification | es |
dc.subject | Security | es |
dc.subject | Declarative security policy | es |
dc.subject | Usage control model | es |
dc.title | A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models | es |
dc.type | info:eu-repo/semantics/conferenceObject | es |
dcterms.identifier | https://ror.org/03yxnpp24 | |
dc.type.version | info:eu-repo/semantics/submittedVersion | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es |
dc.contributor.affiliation | Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos | es |
dc.relation.projectID | TIN2015-63502-C3-2-R | es |
dc.relation.publisherversion | https://link.springer.com/chapter/10.1007/978-3-319-39426-8_23 | es |
dc.identifier.doi | 10.1007/978-3-319-39426-8_23 | es |
dc.contributor.group | Universidad de Sevilla. TIC-258: Data-centric Computing Research Hub | es |
dc.publication.initialPage | 289 | es |
dc.publication.endPage | 301 | es |
dc.eventtitle | BIS 2016: 19th International Conference on Business Information Systems | es |
dc.eventinstitution | Leipzig, Germany | es |
dc.relation.publicationplace | Cham, Switzerland | es |
dc.contributor.funder | Ministerio de Ciencia Y Tecnología (MCYT). España | es |