Security Analysis of Electronic Business Processes
Electronic Commerce Research
A review of information security issues and respective research contributions
ACM SIGMIS Database
Information and Software Technology
Capturing security requirements in business processes through a UML 2.0 activity diagrams profile
CoMoGIS'06 Proceedings of the 2006 international conference on Advances in Conceptual Modeling: theory and practice
Towards a UML 2.0 extension for the modeling of security requirements in business processes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Analysis-level classes from secure business processes through model transformations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
Among other areas electronic commerce includes the fields of electronic markets and workflow management. Workflow management systems are usually used to specify and manage inter- and intra-organizational business processes. Although workflow management techniques are capable to specify and conduct at least parts of market transactions, these techniques are not or very rarely used for this purpose yet. In both fields users demand security and integrity to protect for example their privacy, their property rights or digital payments. To satisfy these security demands a variety of existing security services, mechanisms, protocols, and organizational measures are existent and may be used. At one hand side, to encourage using these techniques it is necessary to have a tool which enables a firm's executive to formulate market transactions security demands at a high abstraction level. On the other hand executing market transactions needs a more formal, machine readable description of the transaction and its security requirements. In this paper we present a methodology to specify secure protocols, which are usable to automatically conduct business processes as well as market transactions.