2018
DOI: 10.1007/978-3-030-00856-7_14
|View full text |Cite
|
Sign up to set email alerts
|

A Valid BPMN Extension for Supporting Security Requirements Based on Cyber Security Ontology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Due to the importance of quality scenarios, including availability and security, in the business of alliances of organizations, M-PoP needs still to be extended by incorporating such quality issues. For this, it is necessary first to explore studies on security in traditional business processes, such as (Chergui and Benslimane, 2018; Pullonen et al. , 2017; Witti et al.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the importance of quality scenarios, including availability and security, in the business of alliances of organizations, M-PoP needs still to be extended by incorporating such quality issues. For this, it is necessary first to explore studies on security in traditional business processes, such as (Chergui and Benslimane, 2018; Pullonen et al. , 2017; Witti et al.…”
Section: Discussionmentioning
confidence: 99%
“…Due to the importance of quality scenarios, including availability and security, in the business of alliances of organizations, M-PoP needs still to be extended by incorporating such Leveraging the systematic modeling of PoP quality issues. For this, it is necessary first to explore studies on security in traditional business processes, such as (Chergui and Benslimane, 2018;Pullonen et al, 2017;Witti et al, 2018), extend them properly to address security scenarios in the PoP context, and, finally, incorporate the outcomes into the M-PoP modeling rules. Another future work is the conduction of more case studies and/or experiments, considering different academic and real-world scenarios in diverse application domains and contexts that could provide an amount of data, generalization of results, as well as improvements in M-PoP.…”
Section: Threats To Validitymentioning
confidence: 99%
“…Another example is that of Neumann et al (2019) who applied their extension to the process of cataract surgery in the university hospital Leipzig but the extension can be used in any hospital. Furthermore, several authors like Maines et al (2016) and Chergui and Benslimane (2018) have put into practice their extensions for experimentations.…”
Section: 6mentioning
confidence: 99%
“…In [16], Salnitri et al propose the SecBPMN-Q query language for representing security policies and a query engine that enables checking SecBPMN-Q policies against SecBPMN-ml specifications. Some works are specifically related to the definition of extensions of BPMN to represent cyber security requirements [7,10]. In [9], the authors investigate a new approach to modeling security and propose a solution to include all concepts potentially modelable in BPMN related to cyber security.…”
Section: Related Work and Conclusionmentioning
confidence: 99%