This paper introduces a security design method for information exchange in organisations. The method supports security authorities in the design of individual security models. An individual security model is a fully customised specification of access control information for information exchange within a particular business environment. We introduce transaction based business process models (BPMs) and utilise these models to specify need-to-know authorisations. Therefore, we allocate information from BPMs which can be transformed to access control information and derive a specification of an organisation's individual security model. Our method provides transparency of security design because a security model is directly related to the business. Moreover, security effort and costs will be reduced because BPMs must not be specified for security reasons. BPMs are a result of management activities and therefore, existing resources from a security point of view.
Authentication protocols have until now focussed on two or three party interaction and neglected n party interactions as in the case of more general group communication. In this discourse, the semantics of group authentication are addressed and a separation into complete and selective group authentication techniques is proposed.
This paper provides an overview of published articles on Business Process Reengineering (BPR). Therefore it reports on an extensive literature review which identified BPR articles published in respected MIS outlets and/or written by three key proponents in the field. Besides manual examination of leading MIS journals and proceedings, the study incorporated a query in the ABI Inform Global reference database locating 552 items. The resulting 17 BPR articles are analyzed according to research approach and content. The analysis gives first insights into the development and state of BPR as a new research field. Based on this analysis we assess BPR and propose suggestions for further research.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.