Enhancing secure business process design with security process patterns

被引:0
|
作者
Nikolaos Argyropoulos
Haralambos Mouratidis
Andrew Fish
机构
[1] University of Brighton,Centre for Secure, Intelligent and Usable Systems, School of Computing, Engineering and Mathematics
来源
关键词
Security requirements engineering; Business process modelling; Security process patterns; Business process security;
D O I
暂无
中图分类号
学科分类号
摘要
Business process definition and analysis are an important activity for any organisation. As research has demonstrated, well-defined business processes can reduce cost, improve productivity and provide organisations with competitive advantages. In the last few years, the need to ensure the security of business processes has been identified as a major research challenge. Limited security expertise of business process developers together with a clear lack of appropriate methods and techniques to support the security analysis of business processes is important prohibitors to providing answers to that research challenge. This paper introduces the first attempt in the literature to produce a novel pattern-based approach to support the design and analysis of secure business processes. Our work draws on elements from the security requirements engineering area and the security patterns area, combined with business process modelling, and it produces a set of process-level security patterns which are used to implement security in a given business process model. Such an approach advances the existing literature by providing a structured way of operationalising security at the business process level of abstraction. The applicability of the work is illustrated through an application to a real-life information system, and the effectiveness and usability of the work are evaluated via a workshop-based experiment. The evaluation clearly indicates that non-experts are able to comprehend and utilise the developed patterns to construct secure business process designs.
引用
收藏
页码:555 / 577
页数:22
相关论文
共 50 条
  • [41] Action Patterns in Business Process Models
    Smirnov, Sergey
    Weidlich, Matthias
    Mendling, Jan
    Weske, Mathias
    [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 115 - +
  • [42] A role-based process security model in business process management
    Kim, Kwanghoon
    Kim, Changmain
    [J]. Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1596 - 1599
  • [43] Design of Intelligent Business Process System and Process Remodeling
    Li, Yan
    Deng, Shao-Ling
    [J]. INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL 1, PROCEEDINGS, 2008, : 589 - 593
  • [44] A security engineering process based on patterns
    Hatebur, Denis
    Heisel, Maritta
    Schmidt, Holger
    [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 734 - +
  • [45] Enhancing business process execution with a context engine
    Janiesch, Christian
    Kuhlenkamp, Joern
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2019, 25 (06) : 1273 - 1290
  • [46] Enhancing business process management with simulation optimization
    April, Jay
    Better, Marco
    Glover, Fred
    Kelly, James
    Laguna, Manuel
    [J]. PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 642 - +
  • [47] Enhancing Business Process Modeling with Context and Ontology
    El Bouroumi, Jamal
    Guermah, Hatim
    Nassar, Mahmoud
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 373 - 380
  • [48] Enhancing Mobile Device Security with Process Mining
    Hluchy, Ladislav
    Habala, Ondrej
    [J]. 2016 IEEE 14TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY), 2016, : 181 - 184
  • [49] Secure Design Patterns for Security in Smart Metering Systems
    Ur-Rehman, Obaid
    Zivic, Natasa
    [J]. UKSIM-AMSS NINTH IEEE EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2015), 2015, : 278 - 283
  • [50] Integrating Security Aspects into Business Process Models
    Brucker, Achim D.
    [J]. IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 239 - 245