Implementing Timed Petri Net in Security Information Systems

A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chin, H.H., Chu-Feng Huang, Jafari, A.A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 220
container_issue
container_start_page 214
container_title
container_volume
creator Chin, H.H.
Chu-Feng Huang
Jafari, A.A.
description A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.
doi_str_mv 10.1109/SSST.2007.352351
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4160837</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4160837</ieee_id><sourcerecordid>4160837</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-d7e7223be807437fff40dea03b40d2410500847f307730750f0e4edd9e26d8443</originalsourceid><addsrcrecordid>eNo1jktLw0AUhccXmFb3gpv5A4n3zjvgRoqPQFEhcV1Sc0dGOmlJxkX-vRF1cfjgfHA4jF0hFIhQ3tR13RQCwBZSC6nxiC1QCaUQhRHHLBNoMHco9cm_AI32lGUApcqFK905W4zjJwAYI3TGbqt42FGkPoX-gzchUsdfKQ2BP1Pioec1vX8NIU286v1-iG0K-7mcxkRxvGBnvt2NdPnHJXt7uG9WT_n65bFa3a3zgFanvLNkhZBbcmCVtN57BR21ILczxc9FAKesl2DtHA0eSFHXlSRM55SSS3b9uxuIaHMYQmyHaaPQgJNWfgPH_EpN</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Implementing Timed Petri Net in Security Information Systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chin, H.H. ; Chu-Feng Huang ; Jafari, A.A.</creator><creatorcontrib>Chin, H.H. ; Chu-Feng Huang ; Jafari, A.A.</creatorcontrib><description>A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.</description><identifier>ISSN: 0094-2898</identifier><identifier>ISBN: 1424410517</identifier><identifier>ISBN: 9781424410514</identifier><identifier>EISSN: 2161-8135</identifier><identifier>EISBN: 1424411262</identifier><identifier>EISBN: 9781424411269</identifier><identifier>DOI: 10.1109/SSST.2007.352351</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Clocks ; Computer security ; Data security ; Information security ; Information System ; Information systems ; Logic ; Petri nets ; Privacy ; Protection ; Security Framework ; Timed Petri Net ; Workflow</subject><ispartof>2007 Thirty-Ninth Southeastern Symposium on System Theory, 2007, p.214-220</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4160837$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4160837$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chin, H.H.</creatorcontrib><creatorcontrib>Chu-Feng Huang</creatorcontrib><creatorcontrib>Jafari, A.A.</creatorcontrib><title>Implementing Timed Petri Net in Security Information Systems</title><title>2007 Thirty-Ninth Southeastern Symposium on System Theory</title><addtitle>SSST</addtitle><description>A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.</description><subject>Access control</subject><subject>Clocks</subject><subject>Computer security</subject><subject>Data security</subject><subject>Information security</subject><subject>Information System</subject><subject>Information systems</subject><subject>Logic</subject><subject>Petri nets</subject><subject>Privacy</subject><subject>Protection</subject><subject>Security Framework</subject><subject>Timed Petri Net</subject><subject>Workflow</subject><issn>0094-2898</issn><issn>2161-8135</issn><isbn>1424410517</isbn><isbn>9781424410514</isbn><isbn>1424411262</isbn><isbn>9781424411269</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1jktLw0AUhccXmFb3gpv5A4n3zjvgRoqPQFEhcV1Sc0dGOmlJxkX-vRF1cfjgfHA4jF0hFIhQ3tR13RQCwBZSC6nxiC1QCaUQhRHHLBNoMHco9cm_AI32lGUApcqFK905W4zjJwAYI3TGbqt42FGkPoX-gzchUsdfKQ2BP1Pioec1vX8NIU286v1-iG0K-7mcxkRxvGBnvt2NdPnHJXt7uG9WT_n65bFa3a3zgFanvLNkhZBbcmCVtN57BR21ILczxc9FAKesl2DtHA0eSFHXlSRM55SSS3b9uxuIaHMYQmyHaaPQgJNWfgPH_EpN</recordid><startdate>200703</startdate><enddate>200703</enddate><creator>Chin, H.H.</creator><creator>Chu-Feng Huang</creator><creator>Jafari, A.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200703</creationdate><title>Implementing Timed Petri Net in Security Information Systems</title><author>Chin, H.H. ; Chu-Feng Huang ; Jafari, A.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-d7e7223be807437fff40dea03b40d2410500847f307730750f0e4edd9e26d8443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Access control</topic><topic>Clocks</topic><topic>Computer security</topic><topic>Data security</topic><topic>Information security</topic><topic>Information System</topic><topic>Information systems</topic><topic>Logic</topic><topic>Petri nets</topic><topic>Privacy</topic><topic>Protection</topic><topic>Security Framework</topic><topic>Timed Petri Net</topic><topic>Workflow</topic><toplevel>online_resources</toplevel><creatorcontrib>Chin, H.H.</creatorcontrib><creatorcontrib>Chu-Feng Huang</creatorcontrib><creatorcontrib>Jafari, A.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chin, H.H.</au><au>Chu-Feng Huang</au><au>Jafari, A.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Implementing Timed Petri Net in Security Information Systems</atitle><btitle>2007 Thirty-Ninth Southeastern Symposium on System Theory</btitle><stitle>SSST</stitle><date>2007-03</date><risdate>2007</risdate><spage>214</spage><epage>220</epage><pages>214-220</pages><issn>0094-2898</issn><eissn>2161-8135</eissn><isbn>1424410517</isbn><isbn>9781424410514</isbn><eisbn>1424411262</eisbn><eisbn>9781424411269</eisbn><abstract>A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.</abstract><pub>IEEE</pub><doi>10.1109/SSST.2007.352351</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0094-2898
ispartof 2007 Thirty-Ninth Southeastern Symposium on System Theory, 2007, p.214-220
issn 0094-2898
2161-8135
language eng
recordid cdi_ieee_primary_4160837
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Clocks
Computer security
Data security
Information security
Information System
Information systems
Logic
Petri nets
Privacy
Protection
Security Framework
Timed Petri Net
Workflow
title Implementing Timed Petri Net in Security Information Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T14%3A57%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Implementing%20Timed%20Petri%20Net%20in%20Security%20Information%20Systems&rft.btitle=2007%20Thirty-Ninth%20Southeastern%20Symposium%20on%20System%20Theory&rft.au=Chin,%20H.H.&rft.date=2007-03&rft.spage=214&rft.epage=220&rft.pages=214-220&rft.issn=0094-2898&rft.eissn=2161-8135&rft.isbn=1424410517&rft.isbn_list=9781424410514&rft_id=info:doi/10.1109/SSST.2007.352351&rft_dat=%3Cieee_6IE%3E4160837%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424411262&rft.eisbn_list=9781424411269&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4160837&rfr_iscdi=true