pdfreaders.org

Security and Safety of Assets in Business Processes

Ganna Monakova, Achim D. Brucker und Andreas Schaad

Cover for monakova.ea:securing:2012.Business processes and service compositions are defined independent of the realizing systems. The visualization of security and safety constraints on the business process model level appears to be a promising approach to system independent specification of the security and safety requirements. Such requirements can be realized through business process annotation and used for communication or documentation, but they also can have an execution semantics that allows for automating the security and safety controls. In this paper, we present a tool-supported framework that extends modeling and execution of business processes with specification, execution and monitoring of the security and safety constraints that are used to protect business assets. We illustrate our approach on basis of a case study modeling a supply chain for perishable goods.

Schlüsselwörter: BPMN, monitoring, resource modeling, safety, security
Kategorien: , ,
Dokumente: (Artikel als PDF Datei)

QR Code for monakova.ea:securing:2012.Bitte zitieren sie diesen Artikel wie folgt:
Ganna Monakova, Achim D. Brucker und Andreas Schaad. Security and Safety of Assets in Business Processes. In ACM Symposium on Applied Computing (SAC). , pages 1667-1673, ACM Press, 2012.
Schlüsselwörter: BPMN, monitoring, resource modeling, safety, security
(Artikel als PDF Datei) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/2245276.2232045) (ACM) (Share article on LinkedIn. Share article on CiteULike.)

BibTeX
@InProceedings{ monakova.ea:securing:2012,
abstract = {Business processes and service compositions are defined independent of the realizing systems. The visualization of security and safety constraints on the business process model level appears to be a promising approach to system independent specification of the security and safety requirements. Such requirements can be realized through business process annotation and used for communication or documentation, but they also can have an execution semantics that allows for automating the security and safety controls. In this paper, we present a tool-supported framework that extends modeling and execution of business processes with specification, execution and monitoring of the security and safety constraints that are used to protect business assets. We illustrate our approach on basis of a case study modeling a supply chain for perishable goods.},
address = {New York, NY, USA},
author = {Ganna Monakova and Achim D. Brucker and Andreas Schaad},
booktitle = {ACM Symposium on Applied Computing (SAC)},
copyright = {ACM},
copyrighturl = {http://dl.acm.org/authorize?},
doi = {10.1145/2245276.2232045},
isbn = {978-1-4503-0857-1},
keywords = {BPMN, monitoring, resource modeling, safety, security},
location = {Trento, Italy},
pages = {1667--1673},
pdf = {https://www.brucker.ch/bibliography/download/2012/monakova.ea-securing-2012.pdf},
publisher = {ACM Press},
title = {Security and Safety of Assets in Business Processes},
url = {https://www.brucker.ch/bibliography/abstract/monakova.ea-securing-2012},
year = {2012},
}