scispace - formally typeset
C

Christian Wolter

Researcher at Bombardier Inc.

Publications -  14
Citations -  569

Christian Wolter is an academic researcher from Bombardier Inc.. The author has contributed to research in topics: Business process modeling & Business Process Model and Notation. The author has an hindex of 8, co-authored 14 publications receiving 560 citations. Previous affiliations of Christian Wolter include Hasso Plattner Institute.

Papers
More filters
Book ChapterDOI

Modeling of task-based authorization constraints in BPMN

TL;DR: An authorization constraint artifact for BPMN is developed to describe authorization constraints inspired by a real world banking workflow scenario, and several aspects of future work related to verification and consistency analysis of modeled authorization constraints, tool-supported and pattern-driven authorization constraint description, and automatic derivation of authorization policies are identified.
Journal ArticleDOI

Model-driven business process security requirement specification

TL;DR: This paper argues that specific types of security goals may be expressed in a graphical fashion at the business process modelling level which in turn can be transformed into corresponding access control and security policies.

Modelling Security Goals in Business Processes

TL;DR: This paper argues that specific types of security goals may be expressed in a graphical fashion at the business process modelling level which can be transformed into corresponding access control and security policies for process-aware information systems, for instance based on service-oriented architectures.
Book ChapterDOI

Verification of Business Process Entailment Constraints Using SPIN

TL;DR: This paper utilises a security enhanced BPMN notation to define access control properties of a security annotated business process model and uses an automatic translation of the process model into a process meta language (Promela) based on Coloured Petri net semantics.
Book ChapterDOI

Deriving XACML policies from business process models

TL;DR: A mapping between the BPMN andXACML metamodels is defined to provide a model-driven extraction of security policies from a business process model and an XSLT converter is presented that transforms modeled security constraints into XACML policies that can be deployed and enforced in a policy enforcement and decision environment.