SecSy is a log synthesis tool which can simulate the execution of a business process. The objective of the tool is to consider the violation of specific security properties during the simulation process. This user guide introduces the core functions of SecSy and how to set up and configure synthesis procedures.
1. First Startup and Simulation Directory
3. Configuring Simulation Procedures
3.1. Configuring Time Generators
3.3 Configuring Data Containers
3.4. Configuring Simulation Runs
4. Running Simulation Procedures
The tool was implemented and tested on Apple OSX 10.8. Depending on the operating system SecSy is run, windows and dialogs may look differently.