메뉴 건너뛰기




Volumn , Issue , 2008, Pages 187-194

Defining secure business processes with respect to multiple objectives

Author keywords

Multiobjective decision support; Risk assessment; Secure business processes; Security

Indexed keywords

BUSINESS ACTIVITIES; BUSINESS ENVIRONMENTS; BUSINESS PROCESSES; DECISION MAKERS; INTERNATIONAL CONFERENCES; MULTIOBJECTIVE DECISION SUPPORT; MULTIPLE OBJECTIVES; RISK ASSESSMENT; SECURE BUSINESS PROCESSES; SECURITY; SECURITY ISSUES; SECURITY MEASURES; SECURITY REQUIREMENTS; THREATS AND VULNERABILITIES;

EID: 49049104639     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.174     Document Type: Conference Paper
Times cited : (17)

References (57)
  • 1
    • 0007840241 scopus 로고    scopus 로고
    • Workflow Management Systeme: Ein Beitrag der IT zur Geschäftsprozess-Orientierung & -Optimierang - Grundlagen, Standards und Trends
    • Springer
    • C. Hastedt-Marckwardt, "Workflow Management Systeme: Ein Beitrag der IT zur Geschäftsprozess-Orientierung & -Optimierang - Grundlagen, Standards und Trends," in Informatik Spektrum. Springer, 1999, vol. 22, pp. 99-109.
    • (1999) Informatik Spektrum , vol.22 , pp. 99-109
    • Hastedt-Marckwardt, C.1
  • 2
    • 84911974729 scopus 로고    scopus 로고
    • Business process management: A boundaryless approach to modern competitiveness
    • M. Zairi, "Business process management: a boundaryless approach to modern competitiveness," Business Process Management, vol. 3, no. 1. pp. 64-80, 1997.
    • (1997) Business Process Management , vol.3 , Issue.1 , pp. 64-80
    • Zairi, M.1
  • 3
    • 0037238281 scopus 로고    scopus 로고
    • The complementary use of idef and uml modelling approaches
    • C. H. Han, R. H. Westen, A. Hodgson, and K. H. Lee, "The complementary use of idef and uml modelling approaches," Computers in Industry, vol. 50, pp. 35-56, 2003.
    • (2003) Computers in Industry , vol.50 , pp. 35-56
    • Han, C.H.1    Westen, R.H.2    Hodgson, A.3    Lee, K.H.4
  • 4
    • 33750957085 scopus 로고    scopus 로고
    • T Neubauer, M. Klemen, and S. Biffl, Secure business process management: a roadmap, in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
    • T Neubauer, M. Klemen, and S. Biffl, "Secure business process management: a roadmap," in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
  • 5
    • 49049091471 scopus 로고    scopus 로고
    • Hackers prey on our insecurities, The Wall Street Journal
    • February
    • P. Kedrosky, "Hackers prey on our insecurities," The Wall Street Journal. The Wall Street Journal, February 2000.
    • (2000) The Wall Street Journal
    • Kedrosky, P.1
  • 6
    • 34748877424 scopus 로고    scopus 로고
    • Online, Available
    • Computer economics. [Online]. Available: www.computereconomics.com
    • Computer economics
  • 7
    • 3042782049 scopus 로고    scopus 로고
    • What is computer security?
    • Jan.-Feb
    • M. Bishop, "What is computer security?" IEEE Sec. Priv. Mag., vol. 1, no, 1, pp. 67-69, Jan.-Feb. 2003.
    • (2003) IEEE Sec. Priv. Mag , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 9
    • 0002096587 scopus 로고    scopus 로고
    • Uml 2001: A standardization odyssey
    • C. Kobryn, "Uml 2001: a standardization odyssey," Commun. ACM, vol. 42, no. 10, pp. 29-37, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.10 , pp. 29-37
    • Kobryn, C.1
  • 11
    • 0242403961 scopus 로고    scopus 로고
    • Umlsec: Extending uml for secure systems development
    • Springer
    • J. Jürjens, "Umlsec: Extending uml for secure systems development," in UML 2002. Springer, 2002.
    • (2002) UML 2002
    • Jürjens, J.1
  • 14
    • 33750937974 scopus 로고    scopus 로고
    • Security and integrity requirements of business processes - analysis and approach to support their realisation
    • G. Herrmann, "Security and integrity requirements of business processes - analysis and approach to support their realisation," in Consortium on Advanced Information Systems Engineering, 1999, pp. 36-47.
    • (1999) Consortium on Advanced Information Systems Engineering , pp. 36-47
    • Herrmann, G.1
  • 15
    • 84991269825 scopus 로고    scopus 로고
    • C. Pfleeger, The fundamentals of information security, IEEE Softw., 14, no, 1, pp. 15-16,60, Jan.-Feb. 1997.
    • C. Pfleeger, "The fundamentals of information security," IEEE Softw., vol. 14, no, 1, pp. 15-16,60, Jan.-Feb. 1997.
  • 17
    • 49049084951 scopus 로고    scopus 로고
    • FIPS Publication (65), National Institute of Standards and Technologies Std., 1979.
    • FIPS Publication (65), National Institute of Standards and Technologies Std., 1979.
  • 18
    • 33750953084 scopus 로고    scopus 로고
    • T. Neubauer, C. Stummer, and E. Weippl, Workshop-based multiobjective security safeguard selection, in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
    • T. Neubauer, C. Stummer, and E. Weippl, "Workshop-based multiobjective security safeguard selection," in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
  • 19
    • 34548800168 scopus 로고    scopus 로고
    • How much is enough? A risk-management approach to computer security
    • Consortium for Research on Information Security and Policy CRISP, Tech. Rep, June
    • K. J. SooHoo, "How much is enough? A risk-management approach to computer security," Consortium for Research on Information Security and Policy (CRISP), Tech. Rep., June 2000,
    • (2000)
    • SooHoo, K.J.1
  • 20
    • 0032632088 scopus 로고    scopus 로고
    • Computer security - what should you spend your money on?
    • K. Buzzard, "Computer security - what should you spend your money on?" Computers and Security, vol. 18, pp. 322-334, 1999.
    • (1999) Computers and Security , vol.18 , pp. 322-334
    • Buzzard, K.1
  • 21
    • 0037252218 scopus 로고    scopus 로고
    • Good-enough security
    • R. Sandhu, "Good-enough security," IEEE Internet Comput., vol. 7, no. 1, pp. 66-68, 2003.
    • (2003) IEEE Internet Comput , vol.7 , Issue.1 , pp. 66-68
    • Sandhu, R.1
  • 25
    • 27844548810 scopus 로고    scopus 로고
    • A conditioned secure access control model based on multi-weighted roles in workflow systems
    • Budapest, Hungary, 27-29 June
    • J. Zhang, J. Sun, N. Li, and C. Hu, "A conditioned secure access control model based on multi-weighted roles in workflow systems," in International Conference on Control and Automation (ICCA2005), Budapest, Hungary, 27-29 June 2005.
    • (2005) International Conference on Control and Automation (ICCA2005)
    • Zhang, J.1    Sun, J.2    Li, N.3    Hu, C.4
  • 28
    • 49049119407 scopus 로고
    • Information Security: An Integrated Collection of Essays
    • H. J. Podell, Ed
    • M. D. Abrams and S. Jajodia, Information Security: An Integrated Collection of Essays, H. J. Podell, Ed. IEEE Computer Society Press, 1995.
    • (1995) IEEE Computer Society Press
    • Abrams, M.D.1    Jajodia, S.2
  • 31
    • 0034159453 scopus 로고    scopus 로고
    • Information systems risk management: Key concepts and business processes
    • T. Finne, "Information systems risk management: Key concepts and business processes," Computers and Security, vol. 19, pp. 234-242, 2000.
    • (2000) Computers and Security , vol.19 , pp. 234-242
    • Finne, T.1
  • 35
    • 49049101195 scopus 로고    scopus 로고
    • Using process models to analyze security requirements,
    • Ph.D. dissertation, Wirtschaftswissenschaftliche Fakultät der Universität Zürich, Mar
    • S. Rohrig, "Using process models to analyze security requirements," Ph.D. dissertation, Wirtschaftswissenschaftliche Fakultät der Universität Zürich, Mar, 2003.
    • (2003)
    • Rohrig, S.1
  • 36
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating information security investments using the analytic hierarchy process
    • L. D. Bodin, L. A. Gordon, and M. P. Loeb, "Evaluating information security investments using the analytic hierarchy process," Commun. ACM, vol. 48, no. 2, pp. 78-83, 2005,
    • (2005) Commun. ACM , vol.48 , Issue.2 , pp. 78-83
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.P.3
  • 37
    • 0031355379 scopus 로고    scopus 로고
    • Enforcing mandatory and discretionary security in workflow management systems
    • V. Atluri and W.-K. Huang, "Enforcing mandatory and discretionary security in workflow management systems," Journal of Computer Security, vol. 5, no. 4, pp. 303-339, 1997.
    • (1997) Journal of Computer Security , vol.5 , Issue.4 , pp. 303-339
    • Atluri, V.1    Huang, W.-K.2
  • 38
    • 0041524664 scopus 로고    scopus 로고
    • A logical framework for reasoning about access control models
    • E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, "A logical framework for reasoning about access control models," ACM Trans. Inf. Syst. Secur., vol. 6, no. 1, pp. 71-127, 2003,
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1 , pp. 71-127
    • Bertino, E.1    Catania, B.2    Ferrari, E.3    Perlasca, P.4
  • 39
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 41
  • 42
    • 33746567089 scopus 로고    scopus 로고
    • B. Wang, S. Zhang, and X. Xiawa, Grid and Cooperative Computing, ser LNCS. Springer Berlin/Heidelberg, 2004, ch. The Application Research of Role-Based Access Control Model in Workflow Management System, pp. 1034-1037.
    • B. Wang, S. Zhang, and X. Xiawa, Grid and Cooperative Computing, ser LNCS. Springer Berlin/Heidelberg, 2004, ch. The Application Research of Role-Based Access Control Model in Workflow Management System, pp. 1034-1037.
  • 44
    • 49049111712 scopus 로고    scopus 로고
    • Integration von Public-Key-Mechanismen in Petri-Netz-Workflows
    • K. Bauknecht and S. Teufel, Eds, Oct
    • K. Knorr and H. Weidner, "Integration von Public-Key-Mechanismen in Petri-Netz-Workflows," in Sicherheit in Informationssysteme SIS 2000, K. Bauknecht and S. Teufel, Eds., Oct. 2000, pp. 202-220.
    • (2000) Sicherheit in Informationssysteme SIS 2000 , pp. 202-220
    • Knorr, K.1    Weidner, H.2
  • 49
    • 0141919268 scopus 로고    scopus 로고
    • The is risk analysis based on a business model
    • B. Suh and I. Han, "The is risk analysis based on a business model," Inf. Manage., vol. 41, no. 2, pp. 149-158, 2003.
    • (2003) Inf. Manage , vol.41 , Issue.2 , pp. 149-158
    • Suh, B.1    Han, I.2
  • 50
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps - a guided tour to the CORAS method
    • Jan
    • F. den Braber, I. Hogganvik, M. S. Lund, K. Stolen, and F. Vraalsen, "Model-based security analysis in seven steps - a guided tour to the CORAS method," BT Technology Journal, vol. 25, no. 1, pp. 101-117, Jan. 2007.
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • den Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stolen, K.4    Vraalsen, F.5
  • 51
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From uml models to access control infrastructures
    • January
    • D. Basin, J. Doser, and T. Lodderstedt, "Model driven security: From uml models to access control infrastructures," ACM Trans. Softw. Eng. Methodol., vol. 15, no. 1, pp. 39-91, January 2006.
    • (2006) ACM Trans. Softw. Eng. Methodol , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 53
    • 0034497420 scopus 로고    scopus 로고
    • G. Sindre and A. Opdahl, Eliciting security requirements by misuse cases, in Procs. 37th International Conference onTechnology of Object-Oriented Languages and Systems, 2000. TOOLS-Pacific 2000., 20-23 Nov. 2000, pp. 120-131.
    • G. Sindre and A. Opdahl, "Eliciting security requirements by misuse cases," in Procs. 37th International Conference onTechnology of Object-Oriented Languages and Systems, 2000. TOOLS-Pacific 2000., 20-23 Nov. 2000, pp. 120-131.
  • 54
    • 33749367621 scopus 로고    scopus 로고
    • Security requirement analysis of business processes
    • P. Herrmann and G. Herrmann, "Security requirement analysis of business processes," Electronic Commerce Research, vol. 6, no. 3-4, pp. 305-335, 2006.
    • (2006) Electronic Commerce Research , vol.6 , Issue.3-4 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.