[PDF][PDF] Business process regulatory compliance management solution frameworks: A comparative evaluation
M El Kharbili - Proceedings of the Eighth Asia …, 2012 - crpit.scem.westernsydney.edu.au
Regulatory compliance management (RCM) is a problem gaining wide interest in the
business process management (BPM) community. However, research has not yet provided …
business process management (BPM) community. However, research has not yet provided …
[HTML][HTML] A compliance assessment system for Incident Management process
Abstract The Incident Management (IM) process is one of the core activities for increasing
the overall security level of organizations and better responding to cyber attacks. Different …
the overall security level of organizations and better responding to cyber attacks. Different …
SecureBPMN: Modeling and enforcing access control requirements in business processes
AD Brucker, I Hang, G Lückemeyer… - Proceedings of the 17th …, 2012 - dl.acm.org
Modern enterprise systems have to comply to regulations such as Basel III resulting in
complex security requirements. These requirements need to be modeled at design-time and …
complex security requirements. These requirements need to be modeled at design-time and …
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta… - … 2012, Held as Part of the …, 2012 - Springer
The AVANTSSAR Platform is an integrated toolset for the formal specification and
automated validation of trust and security of service-oriented architectures and other …
automated validation of trust and security of service-oriented architectures and other …
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness
requirements are no exception. Importantly, undetected conflicts between such requirements …
requirements are no exception. Importantly, undetected conflicts between such requirements …
Business Process Modeling for Insider threat monitoring and handling
V Stavrou, M Kandias, G Karoulas… - Trust, Privacy, and Security …, 2014 - Springer
Business process modeling has facilitated modern enterprises to cope with the constant
need to increase their productivity, reduce costs and offer competitive products and services …
need to increase their productivity, reduce costs and offer competitive products and services …
SATMC: a SAT-based Model Checker for Security-critical Systems
Abstract We present SATMC 3.0, a SAT-based bounded model checker for security-critical
systems that stems from a successful combination of encoding techniques originally …
systems that stems from a successful combination of encoding techniques originally …
Secure conflicts avoidance in multidomain environments: A distributed approach
In a multidomain application environment, it is of paramount importance for different
organizations to collaborate with each other to facilitate secure interoperation. However …
organizations to collaborate with each other to facilitate secure interoperation. However …
Dynamic implementation of security requirements in business processes
Separations of Duties (SoDs) are an important class of security requirements in business
process management. Their violation may result in system misuse and fraud, leading to …
process management. Their violation may result in system misuse and fraud, leading to …
Detecting conflicts between data-minimization and security requirements in business process models
Detecting conflicts between security and data-minimization requirements is a challenging
task. Since such conflicts arise in the specific context of how the technical and organizational …
task. Since such conflicts arise in the specific context of how the technical and organizational …