Implementing Timed Petri Net in Security Information Systems

H. Chin, Chu Huang, A. A. Jafari
{"title":"Implementing Timed Petri Net in Security Information Systems","authors":"H. Chin, Chu Huang, A. A. Jafari","doi":"10.1109/SSST.2007.352351","DOIUrl":null,"url":null,"abstract":"A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.","PeriodicalId":330382,"journal":{"name":"2007 Thirty-Ninth Southeastern Symposium on System Theory","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 Thirty-Ninth Southeastern Symposium on System Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSST.2007.352351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.
定时Petri网在安全信息系统中的实现
安全信息系统受当前正在处理的信息的保密约束和结构要求的约束。保密约束以信息的敏感性为特征。结构需求涉及依赖于工作流上下文的信息处理控制。工作流是信息过程的一种表示,由一组任务和任务之间的一组依赖关系组成。依赖关系分为两大类:由任务执行顺序决定的依赖关系和由保密约束决定的依赖关系。任务被视为一组定时Petri网组件,这些组件具有指定和验证工作流中时间约束的能力。本文的目的是探讨在安全信息系统中使用定时Petri网作为动态安全保护机制的可能性。该结论为进一步研究提供了可能的方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信