DocumentCode :
3410662
Title :
A methodology to build run-time monitors for security-aware workflows
Author :
Bertolissi, Clara ; Ranise, Silvio
Author_Institution :
LIF, AMU, Marseille, France
fYear :
2013
fDate :
9-12 Dec. 2013
Firstpage :
501
Lastpage :
502
Abstract :
Run-time monitors are crucial to the development of workflow management systems, which are at the heart of several modern E-services. In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorization constraints. The methodology is based on state-of-the-art Satisfiability Modulo Theories techniques.
Keywords :
computability; security of data; workflow management software; e-services; run-time monitors; satisfiability modulo theories techniques; security-aware workflows; workflow management systems; Authorization; Biomedical monitoring; Computational modeling; Heart; Internet; Monitoring;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location :
London
Type :
conf
DOI :
10.1109/ICITST.2013.6750251
Filename :
6750251
Link To Document :
بازگشت