Feedback

X
Obstructions in Security-Aware Business Processes

Obstructions in Security-Aware Business Processes

en

0 Ungluers have Faved this Work
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 92 times via unglue.it ebook links.
  1. 92 - pdf (CC BY) at OAPEN Library.

Keywords

  • Business Process Management
  • Compliance
  • Computer security
  • Computing & information technology
  • Data mining
  • It-security
  • Petri net
  • Privacy & data protection
  • process automation
  • process mining
  • process modeling
  • Process Security
  • Security and Privacy
  • thema EDItEUR::U Computing and Information Technology::UR Computer security
  • thema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection

Links

DOI: 10.1007/978-3-658-38154-7

Editions

edition cover

Share

Copy/paste this into your site: