2011
DOI: 10.1016/j.dss.2011.01.018
|View full text |Cite
|
Sign up to set email alerts
|

Secure business process model specification through a UML 2.0 activity diagram profile

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
42
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 72 publications
(43 citation statements)
references
References 17 publications
0
42
0
1
Order By: Relevance
“…In this work we focus on Mal-activity diagrams [15] (MAD) to define security risk management. MAD is proposed as an extension of UML activity diagrams [14]. It helps developers to elicit the security features, attack method and their countermeasures of an IS.…”
Section: Introductionmentioning
confidence: 99%
“…In this work we focus on Mal-activity diagrams [15] (MAD) to define security risk management. MAD is proposed as an extension of UML activity diagrams [14]. It helps developers to elicit the security features, attack method and their countermeasures of an IS.…”
Section: Introductionmentioning
confidence: 99%
“…The majority of current proposals in the active research on security in the domain of BPM address either the analysis of security properties (e.g., [8,22]) or the augmentation of business process models with security requirement or control specifications (e.g., [6,7,23]). …”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, BPM methodologies, languages, and tooling provide only little support to express the security needs of an organization or the security controls applied within business processes [5]. Most approaches to meet this need address the analysis of business process models with regard to security properties or augment business process models with security requirement or control specifications, e.g., [6,7,8]. However, an approach to develop secure electronic business processes systematically is still missing [9].…”
Section: Introductionmentioning
confidence: 99%
“…Rodríguez et al [35] present a UML profile extension for activity diagrams which aims to support the specification of certain security properties (e.g., access control, integrity, non-repudiation, and privacy). In [35], audits are specified as an additional characteristic for another security property.…”
Section: Related Workmentioning
confidence: 99%
“…In [35], audits are specified as an additional characteristic for another security property. The audit process is treated as a logging of data, and the logged data must be defined via attributes of the corresponding audited entity.…”
Section: Related Workmentioning
confidence: 99%