Supporting Secure Business Process Design via Security Process Patterns

被引:4
作者
Argyropoulos, Nikolaos [1 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
来源
ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2017 AND EMMSAD 2017 | 2017年 / 287卷
基金
欧盟地平线“2020”;
关键词
Security requirements; Business process modelling; Security process patterns; Business process security; REQUIREMENTS;
D O I
10.1007/978-3-319-59466-8_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an important non-functional characteristic of the business processes used by organisations for the coordination of their activities. Nevertheless, the implementation of security at the operational level can be challenging due to the limited security expertise of process designers and the delayed consideration of security during process development. To overcome such issues, expert knowledge and proven security solutions can be captured in the form of process patterns, which can easily be reused and integrated to business processes with minimal security-related knowledge required. In this work we introduce process-level security patterns, each of which contains the main activities required for the operationalisation of different security requirements. The introduced patterns are then used as a component of an existing framework for the creation of secure business process designs, the application of which, is illustrated through a working example. A preliminary evaluation of the proposed patterns is conducted via a workshop session.
引用
收藏
页码:19 / 33
页数:15
相关论文
共 22 条
[1]   Securing business processes using security risk-oriented patterns [J].
Ahmed, Naved ;
Matulevicius, Raimundas .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) :723-733
[2]  
[Anonymous], 2016, DOMAINSPECIFIC CONCE
[3]  
[Anonymous], 2002, SECURITY PATTERNS WE
[4]  
[Anonymous], 2010, Business Process Model and Notation (BPMN) v2.0
[5]  
Argyropoulos Nikolaos, 2016, 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), P1, DOI 10.1109/RCIS.2016.7549305
[6]   Eliciting Security Requirements for Business Processes of Legacy Systems [J].
Argyropoulos, Nikolaos ;
Marquez Alcaniz, Luis ;
Mouratidis, Haralambos ;
Fish, Andrew ;
Rosado, David G. ;
Garcia-Rodriguez de Guzman, Ignacio ;
Fernandez-Medina, Eduardo .
PRACTICE OF ENTERPRISE MODELING, POEM 2015, 2015, 235 :91-107
[7]   Towards the Derivation of Secure Business Process Designs [J].
Argyropoulos, Nikolaos ;
Mouratidis, Haralambos ;
Fish, Andrew .
ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 :248-258
[8]  
Decreus K, 2011, LECT NOTES BUS INF P, V72, P29
[9]   Policy-Enabled Goal-Oriented Requirements Engineering for Semantic Business Process Management [J].
Decreus, Ken ;
Poels, Geert ;
El Kharbili, Marwane ;
Pulvermueller, Elke .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2010, 25 (08) :784-812
[10]  
Fernandez E.B., 2001, P PLOP, V1