Enhancing secure business process design with security process patterns
نویسندگان
چکیده
منابع مشابه
On Process Rewriting for Business Process Security
This paper reports on ongoing work towards a framework to automatically rewrite business process models and, thereby, correctively enforce adherence to regulatory compliance and security policies. Specifically, the paper first motivates the need for rewriting mechanisms as a means to enforce a particular class of properties. Second, it describes the main building blocks of ReWrite, the framewor...
متن کاملGoal-Equivalent Secure Business Process
The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue that they are somehow “equivalent”. In this paper we propose a method for passing from SI*, a modeling language f...
متن کاملSecurity in Business Process Engineering
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust relationships between different parties and their respective security goals can be reflected in a specification, which results in a realistic modeling of business processes in the presence of malicious adversaries. Specia...
متن کاملEnhancing Best Practice in Public Health: Using Process Patterns for Business Process Management
Business Process Management (BPM) is often perceived as a top priority concern in organisations; both in public and private sectors. Process modeling is an embedded component of most BPM initiatives, yet a resource intensive task. How process models can be derived efficiently (i.e. with less resources and time) and effectively (at a high quality to meet the specific needs) is an integral elemen...
متن کاملDesign for Process Security
Chemical process security has been an area of interest due to the potential of process industries as a possible terrorism target. As a result, model-based process security analysis methods that try to detect process vulnerabilities in a fundamental way have been proposed. The design aspect of the problem, however, has not been addressed yet. In this work, an adverse-MPC approach, which enables ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software and Systems Modeling
سال: 2019
ISSN: 1619-1366,1619-1374
DOI: 10.1007/s10270-019-00743-y