Enhancing secure business process design with security process patterns

被引:0
|
作者
Nikolaos Argyropoulos
Haralambos Mouratidis
Andrew Fish
机构
[1] University of Brighton,Centre for Secure, Intelligent and Usable Systems, School of Computing, Engineering and Mathematics
来源
关键词
Security requirements engineering; Business process modelling; Security process patterns; Business process security;
D O I
暂无
中图分类号
学科分类号
摘要
Business process definition and analysis are an important activity for any organisation. As research has demonstrated, well-defined business processes can reduce cost, improve productivity and provide organisations with competitive advantages. In the last few years, the need to ensure the security of business processes has been identified as a major research challenge. Limited security expertise of business process developers together with a clear lack of appropriate methods and techniques to support the security analysis of business processes is important prohibitors to providing answers to that research challenge. This paper introduces the first attempt in the literature to produce a novel pattern-based approach to support the design and analysis of secure business processes. Our work draws on elements from the security requirements engineering area and the security patterns area, combined with business process modelling, and it produces a set of process-level security patterns which are used to implement security in a given business process model. Such an approach advances the existing literature by providing a structured way of operationalising security at the business process level of abstraction. The applicability of the work is illustrated through an application to a real-life information system, and the effectiveness and usability of the work are evaluated via a workshop-based experiment. The evaluation clearly indicates that non-experts are able to comprehend and utilise the developed patterns to construct secure business process designs.
引用
收藏
页码:555 / 577
页数:22
相关论文
共 50 条
  • [21] The use of business process modelling in information systems security analysis and design
    Kokolakis, S.A.
    Demopoulos, A.J.
    Kiountouzis, E.A.
    [J]. Information Management and Computer Security, 2000, 8 (03): : 107 - 116
  • [22] Enhancing business process redesign: Using tools to condense the process
    Corbitt, G
    Wright, L
    [J]. THIRTIETH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL 2: INFORMATION SYSTEMS - COLLABORATION SYSTEMS AND TECHNOLOGY, 1997, : 440 - 446
  • [23] Applicability of Process Viewing Patterns in Business Process Management
    Schumm, David
    Anstett, Tobias
    Leymann, Frank
    Schleicher, Daniel
    [J]. 2010 14TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2010), 2010, : 79 - 88
  • [24] Abstract security patterns and the design of secure systems
    Fernandez, Eduardo B.
    Yoshioka, Nobukazu
    Washizaki, Hironori
    Yoder, Joseph
    [J]. CYBERSECURITY, 2022, 5 (01)
  • [25] Abstract security patterns and the design of secure systems
    Eduardo B. Fernandez
    Nobukazu Yoshioka
    Hironori Washizaki
    Joseph Yoder
    [J]. Cybersecurity, 5
  • [26] Business process design: Process comparison and integration
    Xiao, Lan
    Zheng, Li
    [J]. INFORMATION SYSTEMS FRONTIERS, 2012, 14 (02) : 363 - 374
  • [27] PROCESS GRAMMAR AS A TOOL FOR BUSINESS PROCESS DESIGN
    Lee, Jintae
    Wyner, George M.
    Pentland, Brian T.
    [J]. MIS QUARTERLY, 2008, 32 (04) : 757 - 778
  • [28] Business process design: Process comparison and integration
    Lan Xiao
    Li Zheng
    [J]. Information Systems Frontiers, 2012, 14 : 363 - 374
  • [29] Towards the Derivation of Secure Business Process Designs
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 248 - 258
  • [30] A Secure Business Process Modelling For Better Alignment between Business and IT
    Alotaibi, Youseef
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 4793 - 4802