This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
bpmn-leaks-when-analysis [2020/07/01 10:57] pullonen [Stereotype support] |
bpmn-leaks-when-analysis [2021/02/04 14:38] pullonen [Stereotype support] |
||
---|---|---|---|
Line 113: | Line 113: | ||
* [[https://pleak.io/app/#/view/y8nETLskRKT3Yr4KQRKW | An example model for secret key encryption.]] Open BPMN leaks-when view in Pleak to see the analysis. | * [[https://pleak.io/app/#/view/y8nETLskRKT3Yr4KQRKW | An example model for secret key encryption.]] Open BPMN leaks-when view in Pleak to see the analysis. | ||
- | * [[https://pleak.io/app/#/view/Oit7xtYd7K0JA3e4VyOx| An example model for asymmetric (public key) encryption]] | + | * [[https://pleak.io/app/#/view/Oit7xtYd7K0JA3e4VyOx| An example model for asymmetric (public key) encryption]] Note that each encryption operation considers the encryption operation to also have a randomness as an input and therefore this data object appears in the analysis outcome. |
* [[https://pleak.io/app/#/view/YIYRlv7VcrlRkXwgzxFB| An example for Open/ProtectConfidentiality and PETComputation]] | * [[https://pleak.io/app/#/view/YIYRlv7VcrlRkXwgzxFB| An example for Open/ProtectConfidentiality and PETComputation]] | ||
+ | * [[https://pleak.io/app/#/view/Cuzp6d8rBEyszurqeFQ4| An example of ProtectConfidentiality and partial OpenConfidentiality]] | ||
The stereotypes that are not supported by the analysis can be present on the model, but the tasks with these stereotypes are considered as regular tasks by the analyzer and unsupported stereotypes do not affect the analysis outcome. | The stereotypes that are not supported by the analysis can be present on the model, but the tasks with these stereotypes are considered as regular tasks by the analyzer and unsupported stereotypes do not affect the analysis outcome. |