Towards the derivation of secure business process designs

7Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security is a critical aspect of business processes that organisations utilise to achieve their goals. Current works on secure business process design mainly focus on annotating existing process models with security related concepts. Meanwhile, little attention is given to the rationale and the alignment of such security choices to high-level organisational security goals. To that end, a goal-to-process transformation approach, with a clear security orientation, is introduced, as part of a wider framework. This transformation process, presented through an illustrative example, uses Secure Tropos goal models as an input to create intermediate, security-annotated process skeletons. These can be then refined, through a series of manual tasks, to create secure BPMN process models.

References Powered by Scopus

Secure Tropos: A security-oriented extension of the Tropos methodology

336Citations
N/AReaders
Get full text

Business process management (BPM) standards: A survey

309Citations
N/AReaders
Get full text

A BPMN extension for the modeling of security requirements in business processes

256Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Incorporating privacy patterns into semi-automatic business process derivation

9Citations
N/AReaders
Get full text

Enhancing secure business process design with security process patterns

5Citations
N/AReaders
Get full text

Supporting secure business process design via security process patterns

4Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Argyropoulos, N., Mouratidis, H., & Fish, A. (2015). Towards the derivation of secure business process designs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9382, pp. 248–258). Springer Verlag. https://doi.org/10.1007/978-3-319-25747-1_25

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

50%

Researcher 3

38%

Professor / Associate Prof. 1

13%

Readers' Discipline

Tooltip

Computer Science 6

75%

Business, Management and Accounting 2

25%

Save time finding and organizing research with Mendeley

Sign up for free