Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models

被引:13
作者
Varela-Vaca, Angel J. [1 ]
Parody, Luisa [2 ]
Gasca, Rafael M. [1 ]
Gomez-Lopez, Maria T. [1 ]
机构
[1] Univ Seville, Dept Languages & Comp Syst, Seville 41004, Spain
[2] Univ Loyola Andalucia, Dept Quantitat Methods, Seville 41014, Spain
关键词
Business process management business process model security-risk assessment model-based diagnosis constraint programming; SYSTEMS; MANAGEMENT;
D O I
10.1109/ACCESS.2019.2901408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations execute daily activities to meet their objectives. The performance of these activities can be fundamental for achieving a business objective, but they also imply the assumption of certain security risks that might go against a company's security policies. A risk may be defined as the effects of uncertainty on the achievement of the goals of a company, some of which can be associated with security aspects (e.g., data corruption or data leakage). The execution of the activities can be choreographed using business processes models, in which the risk of the entire business process model derives from a combination of the single activity risks (executed in an isolated manner). In this paper, a risk assessment method is proposed to enable the analysis and evaluation of a set of activities combined in a business process model to ascertain whether the model conforms to the security-risk objectives. To achieve this objective, we use a business process extension with security-risk information to: 1) define an algorithm to verify the level of risk of process models; 2) design an algorithm to diagnose the risk of the activities that fail to conform to the level of risk established in security-risk objectives; and 3) the implementation of a tool that supports the described proposal. In addition, a real case study is presented, and a set of scalability benchmarks of performance analysis is carried out in order to check the usefulness and suitability of automation of the algorithms.
引用
收藏
页码:26448 / 26465
页数:18
相关论文
共 65 条
[1]   Securing business processes using security risk-oriented patterns [J].
Ahmed, Naved ;
Matulevicius, Raimundas .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) :723-733
[2]  
[Anonymous], 2018, 270052018 ISOIEC
[3]  
[Anonymous], 2009, UML PROF MOD QUAL SE
[4]  
[Anonymous], 2004, ENTERPRISE RISK MANA
[5]  
[Anonymous], 2008, RISK AN METH MAN INF
[6]  
[Anonymous], 2010, IBM J RES DEV
[7]  
[Anonymous], 2013, 27001 ISOIEC AENOR
[8]  
[Anonymous], 2017, IBM ILOG CPLEX Optimizer
[9]  
[Anonymous], 2012, COMET
[10]  
[Anonymous], 2002, CCTA RISK AN MAN MET