Title
Eliciting Security Requirements From The Business Processes Using Security Risk-Oriented Patterns
Abstract
Although importance of aligning modelling of business processes and security is growing, there is rather limited research performed on elicitation of security requirements from the business processes. In this paper we discuss how security risk-oriented patterns could help solving the above problem. Using the illustrative example, we present a two-step method for (i) pattern occurrence discovery in, and (ii) for security requirements definition from the business process model. We hope that our proposal could help elicit security requirements at the early system development stages, however, we still need to validate it empirically.
Year
DOI
Venue
2013
10.1515/itit.2013.2002
IT-INFORMATION TECHNOLOGY
Field
DocType
Volume
Security convergence,Computer science,Computer security,Security engineering,Sherwood Applied Business Security Architecture,Computer network,Information security,Security service,Cloud computing security,Security information and event management,Computer security model,Process management
Journal
55
Issue
ISSN
Citations 
6
1611-2776
2
PageRank 
References 
Authors
0.48
0
2
Name
Order
Citations
PageRank
Raimundas Matulevičius145944.97
Naved Ahmed2667.00