2013
DOI: 10.1515/itit.2013.2001
|View full text |Cite
|
Sign up to set email alerts
|

Business Process Security Analysis – Design Time, Run Time, Audit Time

Abstract: This paper reports on approaches and tool support for security and compliance analysis of executable business processes, so-called workflows, employed in the GESINE project. Specifically, focusing on the business layer and the corresponding workflow entities along the business process management lifecycle (i. e., workflow model, instance and event log), the techniques reported on in this paper cover the design time, run time and audit time analysis. Their goal is to verify the adherence to security requirement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…When considering security from a holistic, engineering point of view, we have to assess not only the system and the architecture, but also the human-related aspects of the business process. To establish a structured view of the PAIS architecture, three layers that are relevant to security analysis can be identified (e.g., [3]):…”
Section: Security In Pais Architecturesmentioning
confidence: 99%
“…When considering security from a holistic, engineering point of view, we have to assess not only the system and the architecture, but also the human-related aspects of the business process. To establish a structured view of the PAIS architecture, three layers that are relevant to security analysis can be identified (e.g., [3]):…”
Section: Security In Pais Architecturesmentioning
confidence: 99%