期刊文献+

面向跨组织业务流程的角色行为验证方法

Verification method of role's behavior for inter-organizational business process
下载PDF
导出
摘要 为了更有效地保证跨组织业务流程模型的正确性和合理性,应用Pi演算提出了一种基于状态的角色行为的验证方法。基于Pi演算提出了跨组织业务协作中的角色模型,设计了角色描述表,以清晰、直观地描述角色的权利、职责和义务,进而应用Pi演算验证工具MWB(移动工作平台)的check和step命令提出了单角色验证方法,并在此基础上从业务对象状态和业务操作角度提出了多角色验证方法。实现了角色行为的验证,并为跨组织业务流程的可达性、一致性和死锁等分析奠定基础。 A state based verification method of role' s behavior is proposed using Pi-calculus to guarantee the correctness and justifiabilityof inter-organizational business process. Firstly, a Pi-calculus based role model is presented for the cooperation ofmulti_organizations. Secondly, the role description table is designed to describe the obligation and right of role clearly. Thirdly, the verification method of single role' s behavior is proposed by using check and step commands of MWB, which is a Pi-calculus based on verification tool. And then, the verification method of multi-role' s behaviors is proposed based on the state and business operation of business object. The proposed veri- fication method is based on other business process analysis, such as reachability, consistency and deadlock.
作者 叶鑫 马俊锋
出处 《计算机工程与设计》 CSCD 北大核心 2011年第10期3368-3373,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(71001013) 教育部高等学校博士学科点专项科研基金项目(200801411060) 中央高校基本科研业务费基金项目(DUT09RC(3)060)
关键词 跨组织业务流程管理 角色模型 业务流程分析 PI演算 模型验证 inter-organizational business process management role model business process analysis Pi-calculus model checking
  • 相关文献

参考文献15

  • 1赵旭宝,罗焕佐,周晓晔,王玉.动态组织重构中的角色模型研究[J].信息与控制,2005,34(1):7-11. 被引量:4
  • 2Ye Xin,Yang Xing-kai,Zhu Liming, et al.Research of government horizon business integration management system based on HRNM and agent[C].The IEEE/WIC/ACM International Con- ference on Intelligent Agent Technology,2006:558-561.
  • 3Ye Xin,Niu Guangxin,Dai Zailin.Research on flexible control on dynamic business process in E-government [C]. International Symposium on Information Processing,2008:336-339.
  • 4Niu Guangxin,Ye Xin,Dai Zailin.A Pi-calculus based role net- work model for E-government[C].IEEE International Confe- rence on Information and Automation,2008:1009- 1014.
  • 5Wang Leizhen, Wang Dingwei. A role-based business process modeling methodology[C].Chinese Control and Decision Con- ference,2009:4881-4885.
  • 6Amaud Dury, Sergiy Boroday, Alexandre Petrenko,et al.Formal verification of business workflows and role based access control systems[C].The International Conference on Emerging Security Information,Systems,and Technologies,2007:201-210.
  • 7Aashay Thipse,Rattikom Hewett.Verification of dynamic separa- tion of duty policy for role-based business processes[C].IEEE Region 5 Conference,2008:1-6.
  • 8Basit Shafiq,Ammar Masood,James Joshi,et al.A role-based ac- cess control policy verification framework for real-time systems [C]. 10th IEEE International Workshop on Object-Oriented Real- Time Dependable Systems,2005:13-20.
  • 9邹林,潘理.基于角色访问控制系统中角色结构安全性分析问题的模型检测验证[J].上海交通大学学报,2010,44(9):1192-1196. 被引量:4
  • 10Roberto Lucchi,Manuel Mazzara.A pi-calculus based semantics for WS-BPEL[J].Journal of Logic and Algebraic Programming, 2007,70(1):96-118.

二级参考文献32

  • 1Li N H,Mitchell J C,Winsborough W H.Beyond proofofcompliance: security analysis in trust management[J].Journal of the ACM (JACM),2005,52(3):474-514.
  • 2Sandhu R S,Bhamidipati V,Munawer Q.The ARBAC97 model for rolebased administration of roles[J].ACM Trans,2000,2 (1):105-135.
  • 3Jha S,Li N H,Wang Q H.Toward formal verification of rolebased access control policies[J].IEEE Transactions on Dependable and Secure Computing,2008,5(4): 242-255.
  • 4Hu H X,Ahn G J.Enabling verification and conformance testing for access control model[C]//Proceedings of 13th ACM Symposium on Access Control Models and Technologies (SACMAT).Colorado,USA: Andras Veres,2008:195-204.
  • 5Sandhu R S,Munawer Q.The RRA97 model for rolebased administration of role hierarchies[C]//Proceedings of the 14th Annual Computer Security Applications.Phoenix,AZ: ACSAC,1998:39-50.
  • 6Joshi J B D,Bertino E,Latif U.A generalized temporal rolebased access control model[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(1):4-23.
  • 7Clarke E M,Grumberg O,Peled D A.Model checking[M].Massachusetts,USA:MIT Press,2000.
  • 8Jackson D.Alloy: A lightweight object modeling notation[J].ACM Trans Softw Eng Methodol,2002,11(2):256-290.
  • 9Reith M,Niu J W,Winsborough W H.Toward practical analysis for trust management policy[C]//ASIAN ACM Symposium on Information.Sydney: Computer and Communications Security,2009:310-321.
  • 10Layne K,Lee J.Developing fully functional E-government:A fourstage model[J].Government Information Quarterly,2001,18(2):122-136.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部