Modeling Security Requirements in Service Based Business Processes

被引:0
|
作者
Turki, Sameh Hbaieb [1 ]
Bellaaj, Farah [1 ]
Charfi, Anis [2 ]
Bouaziz, Rafik [1 ]
机构
[1] Univ Sfax, MIRACL Lab, Sfax, Tunisia
[2] SAP Res CEC, Darmstadt, Germany
来源
ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012 | 2012年 / 113卷
关键词
Business Process Modeling; BPMN; Security; Non-functional properties; EXTENSION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-functional concerns such as security are essential in business process management and in service based realizations of business processes. Many works and efforts addressed these concerns on the service layer by developing a number of XML-based standards such as WS-Security and other WS-* standards. However, there are non-functional properties that are on the business process layer and need therefore to be specified in business process models. We notice nevertheless that current business process modeling languages lack appropriate means for specifying non-functional properties such as security for example. In this paper, we present a model driven approach for the development of service based business processes which supports both functional and non functional concerns. We also introduce the concept of profiles to BPMN in analogy to UML Profiles. Based on that, we present a BPMN profile to specify security properties in business process models and illustrate its usage through an example.
引用
收藏
页码:76 / 90
页数:15
相关论文
共 50 条
  • [21] An approach to capture authorisation requirements in business processes
    Wolter, Christian
    Meinel, Christoph
    REQUIREMENTS ENGINEERING, 2010, 15 (04) : 359 - 373
  • [22] Enforcement of entailment constraints in distributed service-based business processes
    Hummer, Waldemar
    Gaubatz, Patrick
    Strembeck, Mark
    Zdun, Uwe
    Dustdar, Schahram
    INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (11) : 1884 - 1903
  • [23] Security Testing of Orchestrated Business Processes in SOA
    Hariharan, C.
    Babu, Chitra
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1426 - 1430
  • [24] Using business modeling methods for requirements specification
    Stolfa, S
    Vondrák, I
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2004, : 298 - 302
  • [25] BPMN4SBP for Multi-dimensional Modeling of Sensitive Business Processes
    Ben Hassen, Mariam
    Turki, Mohamed
    Gargouri, Faiez
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT I, 2022, 13368 : 644 - 657
  • [26] A BPMN Extension for Including Data Quality Requirements in Business Process Modeling
    Rodriguez, Alfonso
    Caro, Angelica
    Cappiello, Cinzia
    Caballero, Ismael
    BUSINESS PROCESS MODEL AND NOTATION, BPMN 2012, 2012, 125 : 116 - 125
  • [27] Modeling and Analysis of Business Processes using Business Objects
    Lodhi, Azeem
    Kassem, Gamal
    Rautenstrauch, Claus
    2009 2ND INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND COMMUNICATION, 2009, : 358 - 363
  • [28] Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models
    Ramadan, Qusai
    Strueber, Daniel
    Salnitri, Mattia
    Riediger, Volker
    Juerjens, Jan
    MODELLING FOUNDATIONS AND APPLICATIONS (ECMFA 2018), 2018, 10890 : 179 - 198
  • [29] Alignment of business processes and requirements through model integration
    Bouzidi, Aljia
    Haddar, Nahla
    Ben Abdallah, Mounira
    Haddar, Kais
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [30] Security Requirements Elicitation from Airline Turnaround Processes
    Matulevicius, Raimundas
    Norta, Alex
    Samarutel, Silver
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2018, 60 (01): : 3 - 20