Modelling E-Business Security Using Business Processes

نویسندگان

  • Sharon Nachtigal
  • Chris J. Mitchell
چکیده

Organisations (enterprises, businesses, government institutions, etc.) have changed their way of doing business from a traditional approach to embrace e-business processes. This change makes the perimeter security approach inappropriate for such organisations. The well-known and widely used security mechanisms, including cryptography-based tools and techniques, cannot provide a sufficient level of security without being a part of a comprehensive organisational approach/philosophy. This approach must be different from the current dominant approach, i.e. perimeter security, and must focus on different organisational components. In this paper we suggest a process security approach, and describe ongoing research with the aim of developing an e-business security model based on this new, process security, approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method for Eliciting Security Requirements from the Business Process Models

In recent years, the business process modelling is matured towards expressing enterprise’s organisational behaviour (i.e., business values and stakeholder interests). This shows potential to perform early security analysis to capture enterprise security needs. Traditionally, security in business processes is addressed either by representing security concepts graphically or by enforcing these se...

متن کامل

Model-based Security Engineering of SOA System Using Security Intent DSL

Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of de...

متن کامل

Second Workshop on Security in Business Processes

The second workshop on Security in Business Processes (SBP’13) was organised in conjunction with the 11th international conference on Business Process Management (BPM 2013). Over 20 participants attended the workshop to present and discuss 6 papers, the insights they offered and the issues they raised. During the half-day workshop, a number of important and emerging issues in this area were dis...

متن کامل

Towards Definition of Secure Business Processes

Business process modelling is one of the major aspects in the modern system development. Recently business process model and notation (BPMN) has become a standard technique to support this activity. Although BPMN is a good approach to understand business processes, there is a limited work to understand how it could deal with business security and security risk management. This is a problem, sin...

متن کامل

Business Process Knowledge Modelling: Method and Tool

The DECOR approach to Business Process Oriented Knowledge Management (BPOKM) is based upon an extended Business Process Modelling, including automatable knowledge retrieval activities, additional knowledge management tasks and sub-processes, and additional process variables used to instruct the latter two. In this paper we present the DECOR Business Process Modelling Method and a software tool ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006