2013
DOI: 10.1007/978-3-642-42001-6_17
|View full text |Cite
|
Sign up to set email alerts
|

Why Are Business Processes Not Secure?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…The application layer defines the security needed by the services and the data schemas required for the execution of the business processes. The infrastructure layer defines the security needed for the software and hardware to automate the execution of business processes [6]. Business process security must consider security each of the three layers.…”
Section: A Bpm Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…The application layer defines the security needed by the services and the data schemas required for the execution of the business processes. The infrastructure layer defines the security needed for the software and hardware to automate the execution of business processes [6]. Business process security must consider security each of the three layers.…”
Section: A Bpm Securitymentioning
confidence: 99%
“…Both the application layer and infrastructure layer have been heavily investigated; however, the business layer is a relatively new and challenging area for research. Such research focuses on business process design time security; the security of the process model is investigated before the actual runtime of the business process instances [6].…”
Section: A Bpm Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the approaches introduced by the scientific literature of the area introduce overwhelming complexity for non-expert users which severely hinders their widespread adoption by the industry today [2], [4]. One important drawback of such approaches is their limited support for modelling techniques, as most of them require process models to be transformed in a specific manner (e.g., Petri-nets, FSMs) before they can be used as input for a model checker.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the importance of security properties of business process models, a number of approaches specialising in security compliance verification have been developed. Nevertheless, as extensively discussed in Section V, since the formal specification of both the process models and their security requirements introduces considerable overhead in specialised knowledge and time, the adoption of such approaches in real life remains rather limited [2], [4].…”
Section: Introductionmentioning
confidence: 99%