Security and safety of assets in business processes
Author(s) -
Ganna Monakova,
Achim D. Brucker,
Andreas Schaad
Publication year - 2012
Publication title -
citeseer x (the pennsylvania state university)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/2245276.2232045
Subject(s) - computer science , business process , business process modeling , documentation , business process model and notation , business requirements , artifact centric business process model , process management , business rule , security testing , process (computing) , computer security model , software engineering , computer security , security information and event management , business , cloud computing security , programming language , engineering , work in process , operations management , cloud computing , operating system
Business processes and service compositions are defined independent of the realizing systems. The visualization of security and safety constraints on the business process model level appears to be a promising approach to system independent specification of the security and safety requirements. Such requirements can be realized through business process annotation and used for communication or documentation, but they also can have an execution semantics that allows for automating the security and safety controls. In this paper, we present a tool-supported framework that extends modeling and execution of business processes with specification, execution and monitoring of the security and safety constraints that are used to protect business assets. We illustrate our approach on basis of a case study modeling a supply chain for perishable goods.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom