Enhancing secure business process design with security process patterns

被引:0
作者
Nikolaos Argyropoulos
Haralambos Mouratidis
Andrew Fish
机构
[1] University of Brighton,Centre for Secure, Intelligent and Usable Systems, School of Computing, Engineering and Mathematics
来源
Software and Systems Modeling | 2020年 / 19卷
关键词
Security requirements engineering; Business process modelling; Security process patterns; Business process security;
D O I
暂无
中图分类号
学科分类号
摘要
Business process definition and analysis are an important activity for any organisation. As research has demonstrated, well-defined business processes can reduce cost, improve productivity and provide organisations with competitive advantages. In the last few years, the need to ensure the security of business processes has been identified as a major research challenge. Limited security expertise of business process developers together with a clear lack of appropriate methods and techniques to support the security analysis of business processes is important prohibitors to providing answers to that research challenge. This paper introduces the first attempt in the literature to produce a novel pattern-based approach to support the design and analysis of secure business processes. Our work draws on elements from the security requirements engineering area and the security patterns area, combined with business process modelling, and it produces a set of process-level security patterns which are used to implement security in a given business process model. Such an approach advances the existing literature by providing a structured way of operationalising security at the business process level of abstraction. The applicability of the work is illustrated through an application to a real-life information system, and the effectiveness and usability of the work are evaluated via a workshop-based experiment. The evaluation clearly indicates that non-experts are able to comprehend and utilise the developed patterns to construct secure business process designs.
引用
收藏
页码:555 / 577
页数:22
相关论文
共 43 条
  • [1] Ahmed N(2014)Securing business processes using security risk-oriented patterns Comput. Stand. Interfaces 36 723-733
  • [2] Matulevičius R(2015)Spider graphs: a graph transformation system for spider diagrams Softw. Syst. Modell. 14 1421-1453
  • [3] Bottoni P(2004)Tropos: an agent-oriented software development methodology Auton. Agents Multi-Agent Syst. 8 203-236
  • [4] Fish A(2010)Policy-enabled goal-oriented requirements engineering for semantic business process management Int. J. Intell. Syst. 25 784-812
  • [5] Parisi-Presicce F(2010)Guest editorial: security requirements engineering: past, present and future Requir Eng 15 1-5
  • [6] Bresciani P(2008)Addressing privacy requirements in system design: the pris method Requir. Eng. 13 241-255
  • [7] Perini A(2007)Secure tropos: a security-oriented extension of the tropos methodology Int. J. Softw. Eng. Knowl. Eng. 17 285-309
  • [8] Giorgini P(2006)Modeling secure systems using an agent-oriented approach and security patterns Int. J. Softw. Eng. Knowl. Eng. 16 471-498
  • [9] Giunchiglia F(2006)Security patterns and requirements for internet-based applications Internet Res. 16 519-536
  • [10] Mylopoulos J(2016)Designing secure business processes with SecBPMN Softw. Syst. Model. 16 737-757