Modeling Security Requirements in Service Based Business Processes

被引:0
|
作者
Turki, Sameh Hbaieb [1 ]
Bellaaj, Farah [1 ]
Charfi, Anis [2 ]
Bouaziz, Rafik [1 ]
机构
[1] Univ Sfax, MIRACL Lab, Sfax, Tunisia
[2] SAP Res CEC, Darmstadt, Germany
来源
ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012 | 2012年 / 113卷
关键词
Business Process Modeling; BPMN; Security; Non-functional properties; EXTENSION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-functional concerns such as security are essential in business process management and in service based realizations of business processes. Many works and efforts addressed these concerns on the service layer by developing a number of XML-based standards such as WS-Security and other WS-* standards. However, there are non-functional properties that are on the business process layer and need therefore to be specified in business process models. We notice nevertheless that current business process modeling languages lack appropriate means for specifying non-functional properties such as security for example. In this paper, we present a model driven approach for the development of service based business processes which supports both functional and non functional concerns. We also introduce the concept of profiles to BPMN in analogy to UML Profiles. Based on that, we present a BPMN profile to specify security properties in business process models and illustrate its usage through an example.
引用
收藏
页码:76 / 90
页数:15
相关论文
共 50 条
  • [11] ETL Processes Security Modeling
    Dammak, Salma
    Ghozzi, Faiza
    Gargouri, Faiez
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2019, 10 (01) : 60 - 84
  • [12] Modeling Service Choreographies with Rule-enhanced Business Processes
    Milanovic, Milan
    Gasevic, Dragan
    2010 14TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2010), 2010, : 194 - 203
  • [13] Modeling and Reconfiguration of critical Business Processes for the purpose of a Business Continuity Management respecting Security, Risk and Compliance requirements at Credit Suisse using Algebraic Graph Transformation
    Brandt, Christoph
    Hermann, Frank
    Engel, Thomas
    2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, : 64 - +
  • [14] Business Process Compliance via Security Validation as a Service
    Compagna, Luca
    Guilleminot, Pierre
    Brucker, Achim D.
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2013), 2013, : 455 - 462
  • [15] Modeling security requirements for cloud-based system development
    Ficco, Massimo
    Palmieri, Francesco
    Castiglione, Aniello
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) : 2107 - 2124
  • [16] OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES
    Varela-Vaca, A. J.
    Gasca, Rafael M.
    Pozo, Sergio
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 370 - 374
  • [17] Modeling languages for business processes and business rules: A representational analysis
    zur Muehlen, Michael
    Indulska, Marta
    INFORMATION SYSTEMS, 2010, 35 (04) : 379 - 390
  • [18] Requirements Elicitation Based on Inception Deck and Business Processes Models in Scrum
    Pastrana, Manuel
    Ordonez, Hugo
    Ordonez, Armando
    Merchan, Luis
    ADVANCES IN COMPUTING, CCC 2017, 2017, 735 : 327 - 339
  • [19] Ensuring business and service requirements in enterprise mashups
    Vesyropoulos, Nikolaos
    Georgiadis, Christos K.
    Katsaros, Panagiotis
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2018, 16 (01) : 205 - 242
  • [20] Ensuring business and service requirements in enterprise mashups
    Nikolaos Vesyropoulos
    Christos K. Georgiadis
    Panagiotis Katsaros
    Information Systems and e-Business Management, 2018, 16 : 205 - 242