Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
Information and Software Technology
Secure business process model specification through a UML 2.0 activity diagram profile
Decision Support Systems
Capturing security requirements in business processes through a UML 2.0 activity diagrams profile
CoMoGIS'06 Proceedings of the 2006 international conference on Advances in Conceptual Modeling: theory and practice
Towards a UML 2.0 extension for the modeling of security requirements in business processes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Analysis-level classes from secure business processes through model transformations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Information Systems and e-Business Management
Hi-index | 0.00 |
A challenging task in security engineering concerns thespecification and integration of security with other requirementsat the top level of requirements engineering. Empiricalstudies show that it is common that end users areable to express their security needs at the business processlevel. Since many security requirements originate at thislevel, it is natural to try to capture and express them withinthe context of business models where end users feel mostcomfortable and where they conceptually belong. In thispaper we develop these views, present an ongoing work intendedto create a UML-based and business process-drivenframework for the development of security-critical systemsand propose an approach to a rigorous treatment of securityrequirements supported by formal methods.