Security Analysis of Electronic Business Processes

  • Authors:
  • Susanne Röhrig;Konstantin Knorr

  • Affiliations:
  • secunet SwissIT AG, Hauptbahnhofstrasse 12, CH-4501 Solothurn, Switzerland roehrig@swiss-it.ch;Siemens CT IC CERT, MCH P 10 377, Otto-Hahn-Ring 6, 81730 Munich, Germany konstantin.knorr@siemens.com

  • Venue:
  • Electronic Commerce Research
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

This article introduces POSeM, a method that uses business process descriptions to derive appropriate security safeguards. This is achieved by assigning security levels to the components of a business process such as actors, artefacts, and activities with a specially developed description language. These levels are checked for consistency, and security measures are derived using a configurable rule base that maps security objectives to safeguards. POSeM in practice is illustrated by an application to electronic business, i.e., the publication process of information for a company's web-site. Both the advantages of POSeM and its possible refinements are discussed.