2003
DOI: 10.1007/10958513_29
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Business Process-Driven Framework for Security Engineering with the UML

Abstract: Abstract.A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is commonly at the business process level that customers and end users are able to express their security needs. In addition, systems are often developed by automating existing manual business processes. Since many security notions belongs conceptually to the world of business processes, it is natural to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…Other efforts that are comparable to ours on a general level in that they address security in an MDA-setting and/or model-based security, can be roughly classified into (1) access control related works: [2,4,7,8,9,18,23,24,28,29], (2) secure database development [10], and (3) specification of high-level security requirements [1,6,11,32]. Although all these works are comparable to ours on a general level, they are in fact quite different in that they do not deal with a formalized notion of refinement, nor do they address information flow security.…”
Section: Related Workmentioning
confidence: 97%
“…Other efforts that are comparable to ours on a general level in that they address security in an MDA-setting and/or model-based security, can be roughly classified into (1) access control related works: [2,4,7,8,9,18,23,24,28,29], (2) secure database development [10], and (3) specification of high-level security requirements [1,6,11,32]. Although all these works are comparable to ours on a general level, they are in fact quite different in that they do not deal with a formalized notion of refinement, nor do they address information flow security.…”
Section: Related Workmentioning
confidence: 97%
“…Vivas et al propose an approach for the development of business process-driven systems where security requirements are integrated into the business model [28]. Security requirements are first stated at the high level of abstraction within a functional representation of the system given by UML diagrams using tagged values.…”
Section: State Of the Art Surveymentioning
confidence: 99%
“…Many contributions have been presented in the state of the art for specifying and enforcing security at UML design [1,2,4,5,6,7,8,14,16,17,18,19,20,22,23,27,28,30]. While sharing almost the same objectives, these contributions Cite this document as follows: http://www.jot.fm/general/JOT template LaTeX.tgz * The research leading to this work was possible due to funding and scientific collaboration with Software Research, Ericsson Canada.…”
Section: Introductionmentioning
confidence: 99%
“…Works related to business process security [6,27,28,39,59,60,64,67] have contributed interesting ideas, but most of the cases do not make it possible to model security needs together with the standard languages for modelling businesses process. Nor do they offer continuity and traceability of these requirements in the rest of the software development process.…”
Section: Introductionmentioning
confidence: 99%