User Tools

Site Tools


bpmn-leaks-when-analysis

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
bpmn-leaks-when-analysis [2021/02/04 14:38]
pullonen [Stereotype support]
bpmn-leaks-when-analysis [2021/02/04 14:39] (current)
pullonen [Stereotype support]
Line 100: Line 100:
  
  
-Using the stereotypes means that the script in BPMN leaks-when is left empty bu the user and there is a PE-BPMN stereotype attached to the task in the PE-BPMN editor. The roles of the inputs (e.g. plaintext and the key) are determined based on the stereotype settings.+Using the stereotypes means that the script in BPMN leaks-when is left empty by the user and there is a PE-BPMN stereotype attached to the task in the PE-BPMN editor. The roles of the inputs (e.g. plaintext and the key) are determined based on the stereotype settings.
  
 For encryption stereotypes we assume that the input data has a field called "​data"​ and the key data object has a field called "​key"​. Hence, the encryption task encrypts the field "​data"​ with the key from field "​key"​ and puts the result into the output field "​data"​. The rest of the fields in the plaintext input are copied to the output with the same names as they had for the input. Decryption works analogously with the fields with the same name. Decryption only succeeds when the right key is used. For encryption stereotypes we assume that the input data has a field called "​data"​ and the key data object has a field called "​key"​. Hence, the encryption task encrypts the field "​data"​ with the key from field "​key"​ and puts the result into the output field "​data"​. The rest of the fields in the plaintext input are copied to the output with the same names as they had for the input. Decryption works analogously with the fields with the same name. Decryption only succeeds when the right key is used.
bpmn-leaks-when-analysis.txt ยท Last modified: 2021/02/04 14:39 by pullonen