TY - CHAP AU - Brucker, Achim D. ED - Brucker, Achim D. ED - Dalpiaz, Fabiano ED - Giorgini, Paolo ED - Meland, Per Håkon ED - Rios, Erkuden PY - 2014 DA - 2014// TI - Using SecureBPMN for Modelling Security-Aware Service Compositions BT - Secure and Trustworthy Service Composition: The Aniketos Approach T3 - Lecture Notes in Computer Science : State of the Art Surveys SP - 110 EP - 120 IS - 8900 PB - Springer-Verlag CY - Heidelberg KW - SecureBPMN, BPMN, Access Control, Confidentiality AB - Today, many systems are built by orchestrating existing services, custom developed services, as well as interaction with users. These orchestrations, also called composition plans, are often described using high-level modelling languages that allow for simplifying 1) the implementation of systems by using generic execution engines and 2) the adaption of deployed systems to changing business needs. Thus, composition plans play an important role for both communicating business requirements between domain experts and system experts, and serving as a basis for the system implementation. At the same time, ICT systems need to fulfil an increasing number of security and compliance requirements. Thus, there is a demand for integrating security and compliance requirements into composition plans. We present SecureBPMN, a language for modelling security properties that can easily be integrated into languages used for describing service orchestrations. Moreover, we integrate SecureBPMN into BPMN and, thus, present a common language for describing service orchestration (in terms of business process models) together with their security and compliance requirements. SN - 978-3-319-13517-5 L1 - https://www.brucker.ch/bibliography/download/2014/brucker-aniketos-securebpmn-2014.pdf UR - https://www.brucker.ch/bibliography/abstract/brucker-aniketos-securebpmn-2014 UR - https://doi.org/10.1007/978-3-319-13518-2_8 DO - 10.1007/978-3-319-13518-2_8 ID - brucker:aniketos-securebpmn:2014 ER -