Enhancing secure business process design with security process patterns

被引:0
|
作者
Nikolaos Argyropoulos
Haralambos Mouratidis
Andrew Fish
机构
[1] University of Brighton,Centre for Secure, Intelligent and Usable Systems, School of Computing, Engineering and Mathematics
来源
关键词
Security requirements engineering; Business process modelling; Security process patterns; Business process security;
D O I
暂无
中图分类号
学科分类号
摘要
Business process definition and analysis are an important activity for any organisation. As research has demonstrated, well-defined business processes can reduce cost, improve productivity and provide organisations with competitive advantages. In the last few years, the need to ensure the security of business processes has been identified as a major research challenge. Limited security expertise of business process developers together with a clear lack of appropriate methods and techniques to support the security analysis of business processes is important prohibitors to providing answers to that research challenge. This paper introduces the first attempt in the literature to produce a novel pattern-based approach to support the design and analysis of secure business processes. Our work draws on elements from the security requirements engineering area and the security patterns area, combined with business process modelling, and it produces a set of process-level security patterns which are used to implement security in a given business process model. Such an approach advances the existing literature by providing a structured way of operationalising security at the business process level of abstraction. The applicability of the work is illustrated through an application to a real-life information system, and the effectiveness and usability of the work are evaluated via a workshop-based experiment. The evaluation clearly indicates that non-experts are able to comprehend and utilise the developed patterns to construct secure business process designs.
引用
收藏
页码:555 / 577
页数:22
相关论文
共 50 条
  • [1] Enhancing secure business process design with security process patterns
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. SOFTWARE AND SYSTEMS MODELING, 2020, 19 (03): : 555 - 577
  • [2] Supporting Secure Business Process Design via Security Process Patterns
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2017 AND EMMSAD 2017, 2017, 287 : 19 - 33
  • [3] From Secure Business Process Modeling to Design-Level Security Verification
    Ramadan, Qusai
    Salnitri, Mattia
    Strueber, Daniel
    Juerjens, Jan
    Giorgini, Paolo
    [J]. 2017 ACM/IEEE 20TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2017), 2017, : 123 - 133
  • [4] Design Patterns for Business Process Individualization
    Wurm, Bastian
    Goel, Kanika
    Bandara, Wasana
    Rosemann, Michael
    [J]. BUSINESS PROCESS MANAGEMENT (BPM 2019), 2019, 11675 : 370 - 385
  • [5] Process Patterns: Reusable Design Artifacts for Business Process Models
    Kabir, Muhammad Ashad
    Xing, Zhenchang
    Chandrasekaran, Prakash
    Lin, Shang-Wei
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 714 - 721
  • [6] A Voucher-Based Security Middleware for Secure Business Process Outsourcing
    Beni, Emad Heydari
    Lagaisse, Bert
    Zhang, Ren
    De Cock, Danny
    Beato, Filipe
    Joosen, Wouter
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017, 2017, 10379 : 19 - 35
  • [7] Business process security -: Managing the new security challenge with X-Tra secure
    Wattel, B
    [J]. INTEGRITY, INTERNAL CONTROL AND SECURITY IN INFORMATION SYSTEMS: CONNECTING GOVERNANCE AND TECHNOLOGY, 2002, 83 : 177 - 186
  • [8] Security in business process management
    Sicherheit in Geschäftsprozessmanagement
    [J]. Accorsi, Rafael (raccorsi@acm.org), 2013, De Gruyter Oldenbourg (55):
  • [9] Security in business process engineering
    Backes, M
    Pfitzmann, B
    Waidner, M
    [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2003, 2678 : 168 - 183
  • [10] Security in Business Process Management
    Accorsi, Rafael
    [J]. IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 215 - 216