[PDF][PDF] Monitoring business processes with queries

C Beeri, A Eyal, T Milo, A Pilberg - … conference on Very large data bases, 2007 - cs.tau.ac.il
Many enterprises nowadays use business processes, based on the BPEL standard, to
achieve their goals. These are complex, often distributed, processes. Monitoring the …

Predictive security analysis for event-driven processes

R Rieke, Z Stoynova - … Network Security: 5th International Conference on …, 2010 - Springer
This paper presents an approach for predictive security analysis in a business process
execution environment. It is based on operational formal models and leverages process and …

Monitoring security compliance of critical processes

R Rieke, J Repp, M Zhdanova… - 2014 22nd Euromicro …, 2014 - ieeexplore.ieee.org
Enforcing security in process-aware information systems at runtime requires the monitoring
of systems' operation using process information. Analysis of this information with respect to …

Monitoring distributed component-based systems

Y Falcone, H Nazarpour, S Bensalem… - Formal Aspects of …, 2021 - Springer
We monitor asynchronous distributed component-based systems with multi-party
interactions. We consider independent components whose interactions are managed by …

FTL-CFree: A fuzzy real-time language for runtime verification

J Perez, J Jimenez, A Rabanal… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper presents the functional specification language fuzzy temporal logic context free
(FTL-CFree), a real runtime language designed to enable industry to model and verify …

Security and Trust in Safety Critical Infrastructures

M Zhdanova - 2022 - tuprints.ulb.tu-darmstadt.de
Critical infrastructures such as road vehicles and railways are undergoing a major change,
which increases the dependency of their operation and control on Information Technology …

[PDF][PDF] Model-based situational security analysis

J Eichler, R Rieke - SECURITY ANALYSIS OF SYSTEM …, 2014 - archiv.ub.uni-marburg.de
Security analysis is growing in complexity with the increase in functionality, connectivity, and
dynamics of current electronic business processes. To tackle this complexity, the application …

[PDF][PDF] Security Compliance Tracking of Processes in Networked Cooperating Systems.

R Rieke, M Zhdanova, J Repp - J. Wirel. Mob. Networks Ubiquitous …, 2015 - isyou.info
Abstract Systems of systems that collaborate for a common purpose are called cooperating
systems. Typical examples of novel cooperating systems are electronic health systems and …

Wearable computing: an overview of progress

EC Urban - Digest of Papers. Third International Symposium on …, 1999 - computer.org
Enforcing security in process-aware information systems at runtime requires the monitoring
of systems' operation using process information. Analysis of this information with respect to …

[PDF][PDF] Probabilistic-Cost Enforcement of Security Policies in Distributed Systems

I Mallios - 2018 - kilthub.cmu.edu
Computer and network security has become of paramount importance in our everyday lives.
Cyber attacks can lead to a wide range of undesirable situations ranging from breaches of …