User Tools

Site Tools


bpmn-leaks-when-analysis

This is an old revision of the document!


BPMN leaks-when analysis

In BPMN leaks-when analysis the input is a BPMN model with annotations in pseudocode to write out how different components are related.

Annotating the model

The BPMN leaks-when analysis uses the SQL privacy editor as an interface although its input language is not SQL. All tasks that transform the data are annotated to show which components of the inputs are used to compute which outputs and to give names to the computations.

Running the analysis

BPMN leaks-when analysis is accessible from the SQL privacy editor and can be activated by clicking the respective button.

The analysis output is a table that summarizes which components of the inputs flow to the outputs. The cells in the table summarize the conditions and filters that the data passes. For data that always flows to the output there were no restrictive filters in the flow. The cell value never means that this output is not affected by that input. Finally, the if condition indicates that the flow is conditional and the passed filters can be seen when hovering over the cell.

Source code

The source code of the analysis tool is available at pleak-leaks-when-analysis repository. The user interface of the analysis tool is accessible through pleak-sql-editor.

Syntax

Computation scripts are only added to tasks. Most tasks are expected to have the respective output data object defined by the scripts. The only difference are the sending tasks that have no script and the task before an exclusive gateway (that task defines the predicate for the gateway). In addition, if PE-BPMN stereotypes are used then some of them result in default scripts - e.g. encryption tasks.

The main functions of interest are names filter_filterName where the prefix filter distingusihes these as the filtering functions collected to the analysis output with the predicate data.

In addition to the filters the lists have special syntax where new objects can be appended and taken out later.

Lists

Association lists are a GADT “(keytype * valuetype) assoclist” with the following six operations:

nil : (keytype * valuetype) assoclist

add: keytype → valuetype → (keytype * valuetype) assoclist → (keytype * valuetype) assoclist

update : keytype → valuetype → (keytype * valuetype) assoclist → (keytype * valuetype) assoclist

find : keytype → (keytype * valuetype) assoclist → valuetype

endsWith : keytype → (keytype * valuetype) assoclist → bool /* note that this probably used in the opposite direction in the model */

contains : keytype → (keytype * valuetype) assoclist → bool

They satisfy the following equalities:

endsWith(, nil) = false

contains(, nil) = false

endsWith(K, add(K', , L)) = (K == K')

endsWith(K, update(, _, L)) = endsWith(K, L)

contains(K, add(K', , L)) = (K == K') || contains(K, L)

contains(K, update(, , L)) = contains(K, L)

find(, nil) = bottom

find(K, add(K', V, L)) = if K == K' then V else find(K, L)

find(K, update(K', V, L)) = if contains(K, L) then (if K = K' then V else find(K, L)) else bottom

bpmn-leaks-when-analysis.1579787255.txt.gz · Last modified: 2020/01/23 15:47 by pullonen