skip to main content
10.1145/2245276.2232045acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Security and safety of assets in business processes

Published:26 March 2012Publication History

ABSTRACT

Business processes and service compositions are defined independent of the realizing systems. The visualization of security and safety constraints on the business process model level appears to be a promising approach to system independent specification of the security and safety requirements. Such requirements can be realized through business process annotation and used for communication or documentation, but they also can have an execution semantics that allows for automating the security and safety controls.

In this paper, we present a tool-supported framework that extends modeling and execution of business processes with specification, execution and monitoring of the security and safety constraints that are used to protect business assets. We illustrate our approach on basis of a case study modeling a supply chain for perishable goods.

References

  1. C. Artelsmair, W. Eßmayr, P. Lang, R. Wagner, and E. Weippl. CoSMo: An approach towards conceptual security modeling. In A. Hameurlain, R. Cicchetti, and R. Traunmüller, editors, Database and Expert Systems Applications (DEXA), volume 2453 of Lecture Notes in Computer Science, pages 557--566. Springer-Verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. A. Basin, J. Doser, and T. Lodderstedt. Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology, 15(1): 39--91, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Bobrik, T. Bauer, and M. Reichert. Proviado - personalized and configurable visualizations of business processes. In EC-Web, pages 61--71, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. D. Brucker and H. Petritsch. A framework for managing and analyzing changes of security policies. In IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pages 105--112. IEEE Computer Society, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Herrmann and G. Herrmann. Security requirement analysis of business processes. 6: 305--335, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Jablonski and M. Götz. Perspective oriented business process visualization. In Business Process Management Workshops, pages 144--155, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Jürjens. Secure Systems Development with UML. Springer-Verlag, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Kader. Increasing food availability by reducing postharvest losses of fresh produce. In V International Postharvest Symposium, International Society for Horticulutral Science, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Lundqvist, C. de Fraiture, and D. Molden. Saving water: From field to fork: Curbing losses and wastage in the food chain. In SIWI Policy Brief, 2008.Google ScholarGoogle Scholar
  10. J. Mendling and J. Recker. Towards systematic usage of labels and icons in business process models. In 13th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2008.Google ScholarGoogle Scholar
  11. G. Monakova and F. Leymann. Workflow ART. In R. Meersman, T. S. Dillon, and P. Herrero, editors, OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, pages 376--393. Springer-Verlag, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Rinderle, R. Bobrik, M. Reichert, and T. Bauer. Business process visualization - use cases, challenges, solutions. In ICEIS (3), pages 204--211, 2006.Google ScholarGoogle Scholar
  13. A. Rodríguez, E. Fernández-Medina, and M. Piattini. A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst., E90-D: 745--752, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel. Model-driven business process security requirement specification. Journal of Systems Architecture, 55(4): 211--223, 2009. Secure Service-Oriented Architectures. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security and safety of assets in business processes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
        March 2012
        2179 pages
        ISBN:9781450308571
        DOI:10.1145/2245276
        • Conference Chairs:
        • Sascha Ossowski,
        • Paola Lecca

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 March 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SAC '12 Paper Acceptance Rate270of1,056submissions,26%Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader