2013
DOI: 10.1016/j.infsof.2013.05.007
|View full text |Cite
|
Sign up to set email alerts
|

Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
17
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 39 publications
0
17
0
1
Order By: Relevance
“…The related work can be divided into the following two subdivisions. Approaches [1,11,23,27] which propose risk-informed design, in which the idea of modeling business processes (in one or several stages) with risks and possible mitigation actions integrated into it are common. These models are then applied to a process model which has already been incorporated the mitigation activities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The related work can be divided into the following two subdivisions. Approaches [1,11,23,27] which propose risk-informed design, in which the idea of modeling business processes (in one or several stages) with risks and possible mitigation actions integrated into it are common. These models are then applied to a process model which has already been incorporated the mitigation activities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These models will be used for representing the configuration parameters according to established policies. Moreover, these models allow setting constraints and attributes between the characteristics of the configurations, as it was proposed in a previous work [16], allowing a greater expressiveness of dependencies and relationships between the different characteristics related to cybersecurity.…”
Section: Introductionmentioning
confidence: 99%
“…This contribution [6] firstly provides a formalization of IT security countermeasures for business processes based on security patterns and feature models for the representation countermeasures. Subsequently, a catalogue of IT security countermeasures have been formalized [4] to enforce confidentiality, integrity, availability and authentication in business processes management systems. Feature-Oriented Domain Analysis (FODA) have been applied [4] over the catalogue of security patterns for the inference, selection, and generation of optimal configurations with regard to single and multiple objectives.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, a catalogue of IT security countermeasures have been formalized [4] to enforce confidentiality, integrity, availability and authentication in business processes management systems. Feature-Oriented Domain Analysis (FODA) have been applied [4] over the catalogue of security patterns for the inference, selection, and generation of optimal configurations with regard to single and multiple objectives. In order to automate FODA, CP techniques have been used where two different analyses have been carried out.…”
Section: Introductionmentioning
confidence: 99%