2009
DOI: 10.1016/j.sysarc.2008.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Model-driven business process security requirement specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
93
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 102 publications
(93 citation statements)
references
References 11 publications
0
93
0
Order By: Relevance
“…Wolter et al [26] present an approach for generating XACML policies for RBAC models in the context of process models as well as generating configurations for Apache Rampart (http://axis.apache.org/axis2/java/rampart/). Moreover, model-based security approaches for UML, e. g., [8,13,16], support, usually, the generation of security configurations as well.…”
Section: Related Workmentioning
confidence: 99%
“…Wolter et al [26] present an approach for generating XACML policies for RBAC models in the context of process models as well as generating configurations for Apache Rampart (http://axis.apache.org/axis2/java/rampart/). Moreover, model-based security approaches for UML, e. g., [8,13,16], support, usually, the generation of security configurations as well.…”
Section: Related Workmentioning
confidence: 99%
“…However, this dynamic task authorisation policy fails to address and tackle the workflow subject's privacy concerns because they discuss only the authorisation requirements and did not investigate the workflow subject's privacy concerns. Wolter et al [28] argue that current process modelling standards are incapable of capturing security goals such as confidentiality, integrity, or dynamic authorisation. Therefore, they proposed a security policy model that contains a set of security constraint models.…”
Section: Related Workmentioning
confidence: 99%
“…Christian Wolter discuses about. [3] ShaziaWasimSadiq discuses about process design is primarily driven by process improvement objectives. Major technical and organizational challenges is identified.…”
Section: Introductionmentioning
confidence: 99%