spacer
spacer search

Software Engineering for Service-Oriented Overlay Computers
Software Engineering for Service-Oriented Overlay Computers

Search
spacer
 
header
Main Menu
 
Home arrow Publications arrow All Publications

SENSORIA All Publications Print

Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

show main publications


Goal-Equivalent Secure Business Process Re-engineering


@INPROCEEDINGS{LMZ,
  title = {{Goal-Equivalent Secure Business Process Re-engineering}},
  author = {{Hugo A.} {L\'opez} and {Fabio} {Massacci} and {Nicola} {Zannone}},
  booktitle = {Proceedings of the 2nd International Workshop on Business Oriented Aspects concerning Semantics and Methodologies in Service-oriented Computing (SeMSo},
  editor = {Elisabetta Di Nitto and Matei Ripeanu},
  pages = {212-223},
  abstract = {The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue that they are somehow ``equivalent''. In this paper we propose a method for passing from SI*, a modeling language for capturing and modeling functional, security, and trust organizational and system requirements, to business process specifications and vice versa. In particular, starting from an old secure business process, we reconstruct the functional and security requirements at organizational level that such a business process was supposed to meet (including the trust relations that existed among the members of the organization). To ensure that the re-engineered business process meets the elicited requirements, we employ a notion of equivalence based on goal-equivalence. Basically, we verify if the execution of the business process, described in terms of the trace it generates, satisfies the organizational model. We motivate and illustrate the method with an e-health case study.},
  publisher = {Springer},
  series = {LNCS},
  volume = {4907},
  year = {2007},
  url = {http://www.springerlink.com/content/p05k230859605t42/fulltext.pdf},
  address = {Vienna},
  crossref = {conf/icsoc/2007w},
  institution = {University of Trento},
  keywords = {business process, compliance, pi-calculus, process algebra, process calculi, security},
  partner = {UNITN},
  school = {Ph.D. school in Computer Science},
  task = {T7.1},
}

spacer

The Sensoria Project Website
2005 - 2010
spacer