Security Requirements of E-Business Processes
نویسندگان
چکیده
$EVWUDFW: This paper presents an open framework for the analysis of security requirements of business processes in electronic commerce. The most important dimensions of the framework are security objectives (confidentiality, integrity, availability, accountability), the phases of and the places/parties involved in the process. The approach is of open nature so that it can be adapted to the heterogeneous needs of different application scenarios. The discussion of business processes within a virtual shopping mall illustrates the capacity and potential of the framework
منابع مشابه
SREBP: Security Requirement Elicitation from Business Processes
In today's fast and dynamic environment, business processes play a crucial role for enterprises to gain competitiveness. The traditional approaches in business process domain tend to focus on business processes execution and their improvement. At the same time business process modelling maturity towards expressing the enterprise's organisational perspective (business values and stake-holders in...
متن کاملGoal-Equivalent Secure Business Process Re-engineering for E-Health
The introduction of ITs in e-Health often requires to re-engineer the business processes used to deliver care. Obviously the new and re-engineered processes are observationally different and thus we cannot use existing modelbased techniques to argue that they are somehow “equivalent”. In this paper we propose a notion of equivalence over secure business processes based on the notion of goal-equ...
متن کاملA Method for Eliciting Security Requirements from the Business Process Models
In recent years, the business process modelling is matured towards expressing enterprise’s organisational behaviour (i.e., business values and stakeholder interests). This shows potential to perform early security analysis to capture enterprise security needs. Traditionally, security in business processes is addressed either by representing security concepts graphically or by enforcing these se...
متن کاملA Phase Model for E-Commerce Business Models and its Application to Security Assessment
New e-commerce business models attempt to exploit information technology to overcome the limitations of traditional business models and to lower costs by improving the efficiency of business processes. A basic requirement for their success is security mechanisms against theft or other fraud. The overall security assessment of business models is complicated, however, since the simple customer-ve...
متن کاملSelecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS
Security mechanisms are substantial to an e-business environment. While many security mechanisms have been developed to secure e-business processes (EBP) and networks, little attention is given to actual process of a systematic decision making. In most cases strongest security level available is selected. In many cases there are low risks and threats associated with the processes and the use of...
متن کامل