[PDF][PDF] Business process regulatory compliance management solution frameworks: A comparative evaluation

M El Kharbili - Proceedings of the Eighth Asia …, 2012 - crpit.scem.westernsydney.edu.au
Regulatory compliance management (RCM) is a problem gaining wide interest in the
business process management (BPM) community. However, research has not yet provided …

[HTML][HTML] A compliance assessment system for Incident Management process

A Palma, G Acitelli, A Marrella, S Bonomi… - Computers & Security, 2024 - Elsevier
Abstract The Incident Management (IM) process is one of the core activities for increasing
the overall security level of organizations and better responding to cyber attacks. Different …

SecureBPMN: Modeling and enforcing access control requirements in business processes

AD Brucker, I Hang, G Lückemeyer… - Proceedings of the 17th …, 2012 - dl.acm.org
Modern enterprise systems have to comply to regulations such as Basel III resulting in
complex security requirements. These requirements need to be modeled at design-time and …

The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures

A Armando, W Arsac, T Avanesov, M Barletta… - … 2012, Held as Part of the …, 2012 - Springer
The AVANTSSAR Platform is an integrated toolset for the formal specification and
automated validation of trust and security of service-oriented architectures and other …

A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements

Q Ramadan, D Strüber, M Salnitri, J Jürjens… - Software and Systems …, 2020 - Springer
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness
requirements are no exception. Importantly, undetected conflicts between such requirements …

Business Process Modeling for Insider threat monitoring and handling

V Stavrou, M Kandias, G Karoulas… - Trust, Privacy, and Security …, 2014 - Springer
Business process modeling has facilitated modern enterprises to cope with the constant
need to increase their productivity, reduce costs and offer competitive products and services …

SATMC: a SAT-based Model Checker for Security-critical Systems

A Armando, R Carbone, L Compagna - … , TACAS 2014, Held as Part of the …, 2014 - Springer
Abstract We present SATMC 3.0, a SAT-based bounded model checker for security-critical
systems that stems from a successful combination of encoding techniques originally …

Secure conflicts avoidance in multidomain environments: A distributed approach

B Yang, H Hu - IEEE Transactions on Systems, Man, and …, 2019 - ieeexplore.ieee.org
In a multidomain application environment, it is of paramount importance for different
organizations to collaborate with each other to facilitate secure interoperation. However …

Dynamic implementation of security requirements in business processes

B Yang, H Hu - IEEE Transactions on Dependable and Secure …, 2020 - ieeexplore.ieee.org
Separations of Duties (SoDs) are an important class of security requirements in business
process management. Their violation may result in system misuse and fraud, leading to …

Detecting conflicts between data-minimization and security requirements in business process models

Q Ramadan, D Strüber, M Salnitri, V Riediger… - … and Applications: 14th …, 2018 - Springer
Detecting conflicts between security and data-minimization requirements is a challenging
task. Since such conflicts arise in the specific context of how the technical and organizational …