Integrating privacy policies into business processes

被引:0
|
作者
Chinosi, Michele [1 ]
Trombetta, Alberto [1 ]
机构
[1] Univ Insubria, Dipartimento Informat & Comunicaz, I-21100 Varese, Italy
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased interest around business processes management and modeling techniques has brought many organizations to make significant investments in business process modeling projects. One of the most recent proposal for a new business process modeling technique is the Business Process Modeling Notation (BPMN). Often, the modeled business processes involve sensible information whose disclosure is usually regulated by privacy policies. As such, the interaction between business processes and privacy policies is a critical issue worth to be investigated. Towards this end, we introduce a data model for BPMN and a corresponding XML-based representation (called BPeX) which we use to check whether a BPeX-represented business process is compliant with a P3P privacy policy. Our checking procedures are very efficient and require standard XML technology, such as XPath.
引用
收藏
页码:13 / 25
页数:13
相关论文
共 50 条
  • [21] Doing business in Europe: economic integration processes, policies, and the business environment
    Bratianu, Constantin
    [J]. EKONOMIA I PRAWO-ECONOMICS AND LAW, 2019, 18 (01): : 111 - 115
  • [22] Security and Privacy in Business Processes: A Posteriori Analysis Techniques
    Strembeck, Mark
    Rinderle-Ma, Stefanie
    [J]. IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 247 - 253
  • [23] Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business
    Yee, George
    Korba, Larry
    [J]. INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2005, 1 (01) : 54 - 69
  • [24] Perspectives for Integrating Knowledge and Business Processes through Collaboration
    Hawryszkiewycz, I. T.
    [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2010, 50 : 82 - 93
  • [25] Integrating constraints to support legally flexible business processes
    Sun, Yuqing
    Huang, Joshua Zhexue
    Meng, Xiangxu
    [J]. INFORMATION SYSTEMS FRONTIERS, 2011, 13 (02) : 171 - 189
  • [26] Integrating business processes with peer-to-peer technology
    Kupsch, F
    Werth, D
    [J]. INTEROPERABILITY OF ENTERPRISE SOFTWARE AND APPLICATIONS, 2006, : 277 - +
  • [27] Integrating constraints to support legally flexible business processes
    Yuqing Sun
    Joshua Zhexue Huang
    Xiangxu Meng
    [J]. Information Systems Frontiers, 2011, 13 : 171 - 189
  • [28] Implementing medical business processes integrating server technologies
    Zoraja, Ivan
    Golem, Vojimir
    Ilijić, Boris
    [J]. Journal of Computing and Information Technology, 2009, 17 (03) : 229 - 237
  • [29] Integrating IoT-Driven Events into Business Processes
    Kirikkayis, Yusuf
    Gallik, Florian
    Seiger, Ronny
    Reichert, Manfred
    [J]. INTELLIGENT INFORMATION SYSTEMS, CAISE FORUM 2023, 2023, 477 : 86 - 94
  • [30] Verification of Access Control Policies for REA Business Processes
    Karimi, Vahid R.
    Cowan, Donald D.
    [J]. 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1095 - 1100