User Tools

Site Tools


bpmn-leaks-when-analysis

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
bpmn-leaks-when-analysis [2020/09/10 15:19]
maria
bpmn-leaks-when-analysis [2021/02/04 14:39]
pullonen [Stereotype support]
Line 100: Line 100:
  
  
-Using the stereotypes means that the script in BPMN leaks-when is left empty bu the user and there is a PE-BPMN stereotype attached to the task in the PE-BPMN editor. The roles of the inputs (e.g. plaintext and the key) are determined based on the stereotype settings.+Using the stereotypes means that the script in BPMN leaks-when is left empty by the user and there is a PE-BPMN stereotype attached to the task in the PE-BPMN editor. The roles of the inputs (e.g. plaintext and the key) are determined based on the stereotype settings.
  
 For encryption stereotypes we assume that the input data has a field called "​data"​ and the key data object has a field called "​key"​. Hence, the encryption task encrypts the field "​data"​ with the key from field "​key"​ and puts the result into the output field "​data"​. The rest of the fields in the plaintext input are copied to the output with the same names as they had for the input. Decryption works analogously with the fields with the same name. Decryption only succeeds when the right key is used. For encryption stereotypes we assume that the input data has a field called "​data"​ and the key data object has a field called "​key"​. Hence, the encryption task encrypts the field "​data"​ with the key from field "​key"​ and puts the result into the output field "​data"​. The rest of the fields in the plaintext input are copied to the output with the same names as they had for the input. Decryption works analogously with the fields with the same name. Decryption only succeeds when the right key is used.
Line 113: Line 113:
  
   * [[https://​pleak.io/​app/#/​view/​y8nETLskRKT3Yr4KQRKW | An example model for secret key encryption.]] Open BPMN leaks-when view in Pleak to see the analysis.   * [[https://​pleak.io/​app/#/​view/​y8nETLskRKT3Yr4KQRKW | An example model for secret key encryption.]] Open BPMN leaks-when view in Pleak to see the analysis.
-  * [[https://​pleak.io/​app/#/​view/​Oit7xtYd7K0JA3e4VyOx| An example model for asymmetric (public key) encryption]]+  * [[https://​pleak.io/​app/#/​view/​Oit7xtYd7K0JA3e4VyOx| An example model for asymmetric (public key) encryption]] ​Note that each encryption operation considers the encryption operation to also have a randomness as an input and therefore this data object appears in the analysis outcome.
   * [[https://​pleak.io/​app/#/​view/​YIYRlv7VcrlRkXwgzxFB| An example for Open/​ProtectConfidentiality and PETComputation]]   * [[https://​pleak.io/​app/#/​view/​YIYRlv7VcrlRkXwgzxFB| An example for Open/​ProtectConfidentiality and PETComputation]]
   * [[https://​pleak.io/​app/#/​view/​Cuzp6d8rBEyszurqeFQ4| An example of ProtectConfidentiality and partial OpenConfidentiality]]   * [[https://​pleak.io/​app/#/​view/​Cuzp6d8rBEyszurqeFQ4| An example of ProtectConfidentiality and partial OpenConfidentiality]]
bpmn-leaks-when-analysis.txt ยท Last modified: 2021/02/04 14:39 by pullonen