An adaptive security model using agent-oriented MDA
Information and Software Technology
Towards framework definition to obtain secure business process from legacy information systems
Proceedings of the first international workshop on Model driven service engineering and data quality and security
Incorporating Security Requirements into Service Composition: From Modelling to Execution
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
An evaluation framework for business process modeling languages in healthcare
Journal of Theoretical and Applied Electronic Commerce Research
Information and Software Technology
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Security and safety of assets in business processes
Proceedings of the 27th Annual ACM Symposium on Applied Computing
SecureBPMN: modeling and enforcing access control requirements in business processes
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Artifact-Centric modeling using BPMN
ICSOC'11 Proceedings of the 2011 international conference on Service-Oriented Computing
Pattern-Based context establishment for service-oriented architectures
Software Service and Application Engineering
A business process modeling notation extension for risk handling
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Towards an approach to design and enforce security in web service composition
International Journal of Web Engineering and Technology
Configuring private data management as access restrictions: from design to enforcement
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Reducing complexity using an interaction room: an experience report
Proceedings of the 31st ACM international conference on Design of communication
Information and Software Technology
Securing business processes using security risk-oriented patterns
Computer Standards & Interfaces
Hi-index | 0.00 |
Business Processes are considered a crucial issue by many enterprises because they are the key to maintain competitiveness. Moreover, business processes are important for software developers, since they can capture from them the necessary requirements for software design and creation. Besides, business process modeling is the center for conducting and improving how the business is operated. Security is important for business performance, but traditionally, it is considered after the business processes definition. Empirical studies show that, at the business process level, customers, end users, and business analysts are able to express their security needs. In this work, we will present a proposal aimed at integrating security requirements through business process modeling. We will summarize our Business Process Modeling Notation extension for modeling secure business process through Business Process Diagrams, and we will apply this approach to a typical health-care business process.