IFIP International Federation for Information Processing
DOI: 10.1007/978-0-387-73655-6_28
|View full text |Cite
|
Sign up to set email alerts
|

From Early Requirements Analysis towards Secure Workflows

Abstract: Requirements engineering is a key step in the software development process that has little counterpart in the design of secure business processes and secure workflows for web services. This paper presents a methodology that allows a business process designer to derive the skeleton of the concrete coarse grained secure business process, that can be further refined into workflows, from the early requirements analysis.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Similarly, Decreus and Poels [24] annotate goal-oriented models in the so-called B-SCP framework with control flow information and transform them into BPMN skeletons. Furthermore, Frankova et al [25] transform SI*/Secure Tropos models into skeletons of process models in BPMN, from which they generate executable processes in BPEL. On the other hand, Santos et al [4] derive goal models from existing process models.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Decreus and Poels [24] annotate goal-oriented models in the so-called B-SCP framework with control flow information and transform them into BPMN skeletons. Furthermore, Frankova et al [25] transform SI*/Secure Tropos models into skeletons of process models in BPMN, from which they generate executable processes in BPEL. On the other hand, Santos et al [4] derive goal models from existing process models.…”
Section: Related Workmentioning
confidence: 99%
“…Frankova et al [12], for example, model security requirements in a formal goal oriented requirements language, called SI*/Secure Tropos, and -following specific verification checks -they produce a Secure BPEL workflow through an iterative process of refinement.…”
Section: Related Workmentioning
confidence: 99%
“…Other researchers directly align goal models with process models (see review in [7]). Their efforts use of (a variant of) i* goal models and various kinds of process models, such as WS-BPEL [33,54] and Role Activity Diagrams [11].…”
Section: Top-down Approachesmentioning
confidence: 99%
“…Andersson et al [3] Andersson et al [4] Bleistein et al [11] de Kinderen et al [21] Edirisurija and Johannesson [26] Frankova et al [33] Gordijn et al [36] Lapouchnian et al [54] Weigand et al [91] Weigand et al [92] x Kudryavtsev et al [52] x x Buder and Felden [12] Gordijn et al [35] Grau et al [37] x Koliadis et al [50] Pijpers et al [75] Solaimani and Bouwman [85] Zlatev and Wobacher [97] x…”
Section: Model-based Alignment Techniquesmentioning
confidence: 99%