2013
DOI: 10.1007/978-3-642-36285-9_66
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Compliant Implementation of Business Process-Driven Systems

Abstract: Abstract. Today's businesses are inherently process-driven. Consequently, the use of business-process driven systems, usually implemented on top of service-oriented or cloud-based infrastructures, is increasing. At the same time, the demand on the security, privacy, and compliance of such systems is increasing as well. As a result, the costs-with respect to computational effort at runtime as well as financial costs-for operating business-process driven systems increase steadily. In this paper, we present a met… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
1

Relationship

4
3

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…This paper extends our previous works in several key aspects: First, the set of properties that can be analysed both on the implementation level as well as on the actual service compositions are extended, eg, to support the analysis of cryptographic properties. Second, formal analyses that yield in a binary “secure” or “inconclusive” result are integrated with quantitative ranking approaches.…”
Section: Introductionmentioning
confidence: 89%
“…This paper extends our previous works in several key aspects: First, the set of properties that can be analysed both on the implementation level as well as on the actual service compositions are extended, eg, to support the analysis of cryptographic properties. Second, formal analyses that yield in a binary “secure” or “inconclusive” result are integrated with quantitative ranking approaches.…”
Section: Introductionmentioning
confidence: 89%
“…We plan to extend our approach along at three lines of research: (i) automated generation of validation checks to be executed after each update of security-related configurations; (ii) as preliminary discussed in [18], automated check for the implementation validation; (iii) integration with monitoring and process mining frameworks.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the generated security controls require that manually developed parts to not violate the security requirements. To ensure this, we envision to implement static source code checks (see [18] for a first work in this area).…”
Section: Evaluation and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our modular architecture allows to integrate other analysis approaches easily (for details, see Brucker and Hang [10]). …”
Section: B Analysing Securebpmn Modelsmentioning
confidence: 99%