Title | ||
---|---|---|
Eliciting Security Requirements From The Business Processes Using Security Risk-Oriented Patterns |
Abstract | ||
---|---|---|
Although importance of aligning modelling of business processes and security is growing, there is rather limited research performed on elicitation of security requirements from the business processes. In this paper we discuss how security risk-oriented patterns could help solving the above problem. Using the illustrative example, we present a two-step method for (i) pattern occurrence discovery in, and (ii) for security requirements definition from the business process model. We hope that our proposal could help elicit security requirements at the early system development stages, however, we still need to validate it empirically. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1515/itit.2013.2002 | IT-INFORMATION TECHNOLOGY |
Field | DocType | Volume |
Security convergence,Computer science,Computer security,Security engineering,Sherwood Applied Business Security Architecture,Computer network,Information security,Security service,Cloud computing security,Security information and event management,Computer security model,Process management | Journal | 55 |
Issue | ISSN | Citations |
6 | 1611-2776 | 2 |
PageRank | References | Authors |
0.48 | 0 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Raimundas Matulevičius | 1 | 459 | 44.97 |
Naved Ahmed | 2 | 66 | 7.00 |