Eliciting Security Requirements for Business Processes of Legacy Systems

被引:6
|
作者
Argyropoulos, Nikolaos [1 ]
Marquez Alcaniz, Luis [2 ]
Mouratidis, Haralambos [1 ]
Fish, Andrew [1 ]
Rosado, David G. [3 ]
Garcia-Rodriguez de Guzman, Ignacio [3 ]
Fernandez-Medina, Eduardo [3 ]
机构
[1] Univ Brighton, Watts Bldg,Lewes Rd, Brighton BN2 4GJ, E Sussex, England
[2] Spanish Natl Author Markets & Competit CNMC, Madrid, Spain
[3] Univ Castilla La Mancha, E-13071 Ciudad Real, Spain
来源
PRACTICE OF ENTERPRISE MODELING, POEM 2015 | 2015年 / 235卷
关键词
Legacy systems; Business process modelling; Goal-oriented security requirements; Secure Tropos; BPMN; MARBLE; INFORMATION-SYSTEMS; MANAGEMENT; DESIGN; MODELS;
D O I
10.1007/978-3-319-25897-3_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modernisation of enterprise legacy systems, without compromises in their functionality, is a demanding and time consuming endeavour. To retain the underlying business behaviour during their modernisation, the MARBLE TM framework has been developed for the extraction of business process models from their source code. Building on top of that work, in this paper we propose an integrated approach for transforming the extracted legacy process models into Secure Tropos goal models. Such models facilitate the elicitation of security requirements in a high level of abstraction, which are then incorporated back into the process models of the modernised systems as security features. Therefore high level models can be derived from legacy source code with minimal manual intervention, where security can be elaborated by nontechnical stakeholders in alignment with organisational objectives.
引用
收藏
页码:91 / 107
页数:17
相关论文
共 50 条
  • [21] Modelling non-functional requirements of business processes
    Aburub, Faisal
    Odeh, Mohammed
    Beeson, Ian
    INFORMATION AND SOFTWARE TECHNOLOGY, 2007, 49 (11-12) : 1162 - 1171
  • [22] Analysis of information quality requirements in business processes, revisited
    Gharib, Mohamad
    Giorgini, Paolo
    Mylopoulos, John
    REQUIREMENTS ENGINEERING, 2018, 23 (02) : 227 - 249
  • [23] Security Requirements Elicitation from Airline Turnaround Processes
    Matulevicius, Raimundas
    Norta, Alex
    Samarutel, Silver
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2018, 60 (01): : 3 - 20
  • [24] Providing Online Operational Support for Distributed, Security Sensitive Electronic Business Processes
    Talamo, Maurizio
    Povilionis, Armanas
    Arcieri, Franco
    Schunck, Christian H.
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 49 - 54
  • [25] Business process modelling and purpose analysis for requirements analysis of information systems
    Luis de la Vara, Jose
    Sanchez, Juan
    Pastor, Oscar
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2008, 5074 : 213 - 227
  • [26] Complexity in Business Systems Automation Requirements Engineering
    Guerra, L.
    Stapleton, L.
    IFAC PAPERSONLINE, 2019, 52 (25): : 573 - 578
  • [27] Specification and verification of security requirements in a programming model for decentralized CSCW systems
    Ahmed, Tanvir
    Tripathi, Anand R.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (02)
  • [28] Requirements modeling of Web services-based business processes
    Afzal, Ayesha
    Shafiq, Basit
    Shamail, Shafay
    Adam, Nabil
    BUSINESS PROCESS MANAGEMENT JOURNAL, 2020, 26 (06) : 1401 - 1424
  • [29] A Goal-Oriented Requirements Engineering Method for Business Processes
    Decreus, Ken
    Poels, Geert
    INFORMATION SYSTEMS EVOLUTION, 2011, 72 : 29 - 43
  • [30] Combining modelling and simulation approaches How to measure performance of business processes
    Bisogno, Stefania
    Calabrese, Armando
    Gastaldi, Massimo
    Ghiron, Nathan Levialdi
    BUSINESS PROCESS MANAGEMENT JOURNAL, 2016, 22 (01) : 56 - 74