File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Model checking for e-Business control and assurance

TitleModel checking for e-Business control and assurance
Authors
Keywordse-Business
Process and communication protocols
Atomicity
Data typing
Model checking
Issue Date2005
Citation
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 2005, v. 35, n. 3, p. 445-450 How to Cite?
AbstractModel checking is a promising technique for the verification of complex software systems. As the use of the Internet for conducting e-business extends the reach of many organizations, well-designed software becomes the foundation of reliable implementation of e-business processes. These distributed, electronic methods of conducting transactions place reliance on the control structures embedded in the transaction processes. Deficiencies in control structures of processes that support e-business can lead to loss of physical assets, digital assets, money, and consumer confidence. Yet, assessing the reliability of e-business processes is complex and time-consuming. This paper explicates how mode l-checking technology can aid in the design and assurance of e-business processes in complex digital environments. Specifically, we demonstrate how model checking can be used to verify e-business requirements concerning money atomicity, goods atomicity, valid receipt, and communication-link failure. These requirements are fundamental to many e-business applications. Model che cking can be used to test a broad range of systems requirements - not only for system designers, but also for auditors and security specialists. Systems that are examined by auditors need to have adequate controls built in prior to implementation and will need adequate auditing after implementation to ensure that none of the processes have been corrupted. Model checkers may also provide value in examining the processes of highly integrated applications as found in enterprise resource planning systems. © 2005 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/233764
ISSN
2014 Impact Factor: 2.171

 

DC FieldValueLanguage
dc.contributor.authorAnderson, Bonnie Brinton-
dc.contributor.authorHansen, James V.-
dc.contributor.authorLowry, Paul Benjamin-
dc.contributor.authorSummers, Scott L.-
dc.date.accessioned2016-09-27T07:21:35Z-
dc.date.available2016-09-27T07:21:35Z-
dc.date.issued2005-
dc.identifier.citationIEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 2005, v. 35, n. 3, p. 445-450-
dc.identifier.issn1094-6977-
dc.identifier.urihttp://hdl.handle.net/10722/233764-
dc.description.abstractModel checking is a promising technique for the verification of complex software systems. As the use of the Internet for conducting e-business extends the reach of many organizations, well-designed software becomes the foundation of reliable implementation of e-business processes. These distributed, electronic methods of conducting transactions place reliance on the control structures embedded in the transaction processes. Deficiencies in control structures of processes that support e-business can lead to loss of physical assets, digital assets, money, and consumer confidence. Yet, assessing the reliability of e-business processes is complex and time-consuming. This paper explicates how mode l-checking technology can aid in the design and assurance of e-business processes in complex digital environments. Specifically, we demonstrate how model checking can be used to verify e-business requirements concerning money atomicity, goods atomicity, valid receipt, and communication-link failure. These requirements are fundamental to many e-business applications. Model che cking can be used to test a broad range of systems requirements - not only for system designers, but also for auditors and security specialists. Systems that are examined by auditors need to have adequate controls built in prior to implementation and will need adequate auditing after implementation to ensure that none of the processes have been corrupted. Model checkers may also provide value in examining the processes of highly integrated applications as found in enterprise resource planning systems. © 2005 IEEE.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews-
dc.subjecte-Business-
dc.subjectProcess and communication protocols-
dc.subjectAtomicity-
dc.subjectData typing-
dc.subjectModel checking-
dc.titleModel checking for e-Business control and assurance-
dc.typeArticle-
dc.description.natureLink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TSMCC.2004.843181-
dc.identifier.scopuseid_2-s2.0-23944469617-
dc.identifier.volume35-
dc.identifier.issue3-
dc.identifier.spage445-
dc.identifier.epage450-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats