DocumentCode :
2427544
Title :
Implementing Timed Petri Net in Security Information Systems
Author :
Chin, Hubert H. ; Huang, Chu-Feng ; Jafari, Ayat A.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., New York Inst. of Technol., Old Westbury, NY
fYear :
2007
fDate :
4-6 March 2007
Firstpage :
214
Lastpage :
220
Abstract :
A security information system is subject to the secrecy constraints and structural requirements of the current information being processed. Secrecy constraints characterize information based on its sensitivity. Structural requirements concern information processing controls which are dependent on context of the workflow. A workflow is a representation of an information process and is comprised of a set of tasks and a set of dependencies between the tasks. Dependencies fall into two broad categories: those determined by the order of task execution and those determined by secrecy constraints. A task is regarded as a set of timed Petri net components which have the ability to specify and verify time constraints in a workflow. The purpose of this paper is to investigate the possible use of the timed Petri net as a dynamic security protection mechanism in a security information system. The conclusion suggests a possible direction for further research.
Keywords :
Petri nets; authorisation; data privacy; access control; dynamic security protection; secrecy constraint; security information system; structural requirement; timed Petri net; Access control; Clocks; Computer security; Data security; Information security; Information systems; Logic; Petri nets; Privacy; Protection; Access Control; Information System; Security Framework; Timed Petri Net; Workflow;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System Theory, 2007. SSST '07. Thirty-Ninth Southeastern Symposium on
Conference_Location :
Macon, GA
ISSN :
0094-2898
Print_ISBN :
1-4244-1126-2
Electronic_ISBN :
0094-2898
Type :
conf
DOI :
10.1109/SSST.2007.352351
Filename :
4160837
Link To Document :
بازگشت