Title
Frameworks for Secured Business Process Management Systems
Abstract
This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net (ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domains and the application domains. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC (role-based access control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations
Year
DOI
Venue
2006
10.1109/SERA.2006.38
SERA
Keywords
Field
DocType
unified resource access control,workflow management system,coordinative groupware technology,secured business process management systems,commercial government organizations,communication systems,access control model,secured business process management,business process,rbac,standardized security technology,information control,graphical representation,information control net,computer systems,authorisation,role-driven security,icn modeling methodology,workflow management software,secured access control policy,role-based access control model,business data processing,civilian government organizations,groupware,typical business process modeling,business process specification,formal specification,business process management engine,role based access control,communication system,business process management,discretionary access control,access control,security policy,business process model
Artifact-centric business process model,Business process management,Software engineering,Business process,Computer science,Business domain,Business process modeling,Business process discovery,Business Process Model and Notation,Business rule,Process management
Conference
ISBN
Citations 
PageRank 
0-7695-2656-X
3
0.40
References 
Authors
4
3
Name
Order
Citations
PageRank
Haeng-Kon Kim127249.95
Roger Y. Lee256691.34
Hae-Sool Yang3379.67