Implementing Timed Petri Net in Security Information Systems
A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on co...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 220 |
---|---|
container_issue | |
container_start_page | 214 |
container_title | |
container_volume | |
creator | Chin, H.H. Chu-Feng Huang Jafari, A.A. |
description | A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research. |
doi_str_mv | 10.1109/SSST.2007.352351 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4160837</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4160837</ieee_id><sourcerecordid>4160837</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-d7e7223be807437fff40dea03b40d2410500847f307730750f0e4edd9e26d8443</originalsourceid><addsrcrecordid>eNo1jktLw0AUhccXmFb3gpv5A4n3zjvgRoqPQFEhcV1Sc0dGOmlJxkX-vRF1cfjgfHA4jF0hFIhQ3tR13RQCwBZSC6nxiC1QCaUQhRHHLBNoMHco9cm_AI32lGUApcqFK905W4zjJwAYI3TGbqt42FGkPoX-gzchUsdfKQ2BP1Pioec1vX8NIU286v1-iG0K-7mcxkRxvGBnvt2NdPnHJXt7uG9WT_n65bFa3a3zgFanvLNkhZBbcmCVtN57BR21ILczxc9FAKesl2DtHA0eSFHXlSRM55SSS3b9uxuIaHMYQmyHaaPQgJNWfgPH_EpN</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Implementing Timed Petri Net in Security Information Systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chin, H.H. ; Chu-Feng Huang ; Jafari, A.A.</creator><creatorcontrib>Chin, H.H. ; Chu-Feng Huang ; Jafari, A.A.</creatorcontrib><description>A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.</description><identifier>ISSN: 0094-2898</identifier><identifier>ISBN: 1424410517</identifier><identifier>ISBN: 9781424410514</identifier><identifier>EISSN: 2161-8135</identifier><identifier>EISBN: 1424411262</identifier><identifier>EISBN: 9781424411269</identifier><identifier>DOI: 10.1109/SSST.2007.352351</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Clocks ; Computer security ; Data security ; Information security ; Information System ; Information systems ; Logic ; Petri nets ; Privacy ; Protection ; Security Framework ; Timed Petri Net ; Workflow</subject><ispartof>2007 Thirty-Ninth Southeastern Symposium on System Theory, 2007, p.214-220</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4160837$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4160837$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chin, H.H.</creatorcontrib><creatorcontrib>Chu-Feng Huang</creatorcontrib><creatorcontrib>Jafari, A.A.</creatorcontrib><title>Implementing Timed Petri Net in Security Information Systems</title><title>2007 Thirty-Ninth Southeastern Symposium on System Theory</title><addtitle>SSST</addtitle><description>A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.</description><subject>Access control</subject><subject>Clocks</subject><subject>Computer security</subject><subject>Data security</subject><subject>Information security</subject><subject>Information System</subject><subject>Information systems</subject><subject>Logic</subject><subject>Petri nets</subject><subject>Privacy</subject><subject>Protection</subject><subject>Security Framework</subject><subject>Timed Petri Net</subject><subject>Workflow</subject><issn>0094-2898</issn><issn>2161-8135</issn><isbn>1424410517</isbn><isbn>9781424410514</isbn><isbn>1424411262</isbn><isbn>9781424411269</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1jktLw0AUhccXmFb3gpv5A4n3zjvgRoqPQFEhcV1Sc0dGOmlJxkX-vRF1cfjgfHA4jF0hFIhQ3tR13RQCwBZSC6nxiC1QCaUQhRHHLBNoMHco9cm_AI32lGUApcqFK905W4zjJwAYI3TGbqt42FGkPoX-gzchUsdfKQ2BP1Pioec1vX8NIU286v1-iG0K-7mcxkRxvGBnvt2NdPnHJXt7uG9WT_n65bFa3a3zgFanvLNkhZBbcmCVtN57BR21ILczxc9FAKesl2DtHA0eSFHXlSRM55SSS3b9uxuIaHMYQmyHaaPQgJNWfgPH_EpN</recordid><startdate>200703</startdate><enddate>200703</enddate><creator>Chin, H.H.</creator><creator>Chu-Feng Huang</creator><creator>Jafari, A.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200703</creationdate><title>Implementing Timed Petri Net in Security Information Systems</title><author>Chin, H.H. ; Chu-Feng Huang ; Jafari, A.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-d7e7223be807437fff40dea03b40d2410500847f307730750f0e4edd9e26d8443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Access control</topic><topic>Clocks</topic><topic>Computer security</topic><topic>Data security</topic><topic>Information security</topic><topic>Information System</topic><topic>Information systems</topic><topic>Logic</topic><topic>Petri nets</topic><topic>Privacy</topic><topic>Protection</topic><topic>Security Framework</topic><topic>Timed Petri Net</topic><topic>Workflow</topic><toplevel>online_resources</toplevel><creatorcontrib>Chin, H.H.</creatorcontrib><creatorcontrib>Chu-Feng Huang</creatorcontrib><creatorcontrib>Jafari, A.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chin, H.H.</au><au>Chu-Feng Huang</au><au>Jafari, A.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Implementing Timed Petri Net in Security Information Systems</atitle><btitle>2007 Thirty-Ninth Southeastern Symposium on System Theory</btitle><stitle>SSST</stitle><date>2007-03</date><risdate>2007</risdate><spage>214</spage><epage>220</epage><pages>214-220</pages><issn>0094-2898</issn><eissn>2161-8135</eissn><isbn>1424410517</isbn><isbn>9781424410514</isbn><eisbn>1424411262</eisbn><eisbn>9781424411269</eisbn><abstract>A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.</abstract><pub>IEEE</pub><doi>10.1109/SSST.2007.352351</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0094-2898 |
ispartof | 2007 Thirty-Ninth Southeastern Symposium on System Theory, 2007, p.214-220 |
issn | 0094-2898 2161-8135 |
language | eng |
recordid | cdi_ieee_primary_4160837 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Clocks Computer security Data security Information security Information System Information systems Logic Petri nets Privacy Protection Security Framework Timed Petri Net Workflow |
title | Implementing Timed Petri Net in Security Information Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T14%3A57%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Implementing%20Timed%20Petri%20Net%20in%20Security%20Information%20Systems&rft.btitle=2007%20Thirty-Ninth%20Southeastern%20Symposium%20on%20System%20Theory&rft.au=Chin,%20H.H.&rft.date=2007-03&rft.spage=214&rft.epage=220&rft.pages=214-220&rft.issn=0094-2898&rft.eissn=2161-8135&rft.isbn=1424410517&rft.isbn_list=9781424410514&rft_id=info:doi/10.1109/SSST.2007.352351&rft_dat=%3Cieee_6IE%3E4160837%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424411262&rft.eisbn_list=9781424411269&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4160837&rfr_iscdi=true |