메뉴 건너뛰기




Volumn 53, Issue 3, 2011, Pages 139-149

Automated certification for compliant cloud-based business processes;Automatisierte compliance-zertifizierung cloud-basierter geschäftsprozesse

Author keywords

Audit; Business process models; Cloud computing; Compliance certification; Petri nets

Indexed keywords


EID: 84856273290     PISSN: None     EISSN: 18670202     Source Type: Journal    
DOI: 10.1007/s11576-011-0269-z     Document Type: Article
Times cited : (23)

References (51)
  • 1
    • 79959293472 scopus 로고    scopus 로고
    • Strong nonleak guarantees for workflow models
    • Accorsi R, Wonnemann C (2011) Strong nonleak guarantees for workflow models. ACM, SACS, S. 308-314
    • (2011) ACM, SACS
    • Accorsi, R.1    Wonnemann, C.2
  • 3
    • 84862876552 scopus 로고    scopus 로고
    • BDSG, German Federal Ministry of Justice
    • BDSG (2009) Bundesdatenschutzgesetz. German Federal Ministry of Justice
    • (2009) Bundesdatenschutzgesetz
  • 4
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • DOI 10.1109/TSE.2007.70746
    • Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Software Eng 34(1):5-20 (Pubitemid 351343899)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Anton, A.I.2
  • 6
    • 84893581243 scopus 로고    scopus 로고
    • Hints on howto face business process compliance
    • In: Resinas M, Ruiz-Cortés A, Pastor JA, SanchoMR (Hrsg)
    • Cabanillas C, Resinas M, Ruiz-Cortés A (2010) Hints on howto face business process compliance. In: Resinas M, Ruiz-Cortés A, Pastor JA, SanchoMR (Hrsg) Proc JISBD 4, S 26-32
    • (2010) Proc JISBD , vol.4
    • Cabanillas, C.1    Resinas, M.2    Ruiz-Cortés, A.3
  • 8
    • 80051793403 scopus 로고    scopus 로고
    • COMPAS, EU FP7 Project 215175, deliverable 2.1, State of the art in the field of compliance languages
    • COMPAS (2008) Compliance-driven models, languages, and architectures for services. EU FP7 Project 215175, deliverable 2.1State of the art in the field of compliance languages
    • (2008) Compliance-Driven Models, Languages, and Architectures for Services
  • 9
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • CSA, Abruf am 2010-06-29
    • CSA (2009) Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance. http://www. cloudsecurityalliance.org/. Abruf am 2010-06-29
    • (2009) Cloud Security Alliance
  • 10
    • 77954695824 scopus 로고    scopus 로고
    • Top threats to cloud computing
    • CSA, Abruf am 2010-06-29
    • CSA (2010) Top threats to cloud computing. Cloud Security Alliance. http://www. cloudsecurityalliance.org/. Abruf am 2010- 06-29
    • (2010) Cloud Security Alliance
  • 12
    • 51449094371 scopus 로고    scopus 로고
    • Semantics and analysis of business process models in BPMN
    • Dijkman R, Dumas M, Ouyang C (2008) Semantics and analysis of business process models in BPMN. Information & Software Technology 50(12):1281-1294
    • (2008) Information & Software Technology , vol.50 , Issue.12 , pp. 1281-1294
    • Dijkman, R.1    Dumas, M.2    Ouyang, C.3
  • 13
    • 84864560148 scopus 로고    scopus 로고
    • Measuring similarity between semantic business processmodels
    • Ehrig M, Koschmider A, Oberweis A (2007) Measuring similarity between semantic business processmodels. ACS CRPIT 67:71-80
    • (2007) ACS CRPIT , vol.67 , pp. 71-80
    • Ehrig, M.1    Koschmider, A.2    Oberweis, A.3
  • 14
    • 77957895284 scopus 로고    scopus 로고
    • The economic impact of cloud computing on business creation, employment and output in Europe
    • Etro F (2009) The economic impact of cloud computing on business creation, employment and output in Europe. Review of Business and Economics 54(2):179-218
    • (2009) Review of Business and Economics , vol.54 , Issue.2 , pp. 179-218
    • Etro, F.1
  • 16
    • 78951495298 scopus 로고    scopus 로고
    • Cloud computing - benefits, risks and recommendations for information security
    • ENISA
    • ENISA (2009) Cloud computing - benefits, risks and recommendations for information security. European Network Information and Security Agency
    • (2009) European Network Information and Security Agency
  • 18
    • 80051786682 scopus 로고    scopus 로고
    • Gramm-leach-bliley act
    • GLB
    • GLB (1999) Gramm-Leach-Bliley Act. In: Congress of the USA
    • (1999) Congress of the USA
  • 19
    • 67649921330 scopus 로고    scopus 로고
    • Detecting regulatory compliance for business processmodels through semantic annotations
    • Governatori G, Hoffmann J, Sadiq SW,Weber I (2009) Detecting regulatory compliance for business processmodels through semantic annotations. Springer LNBPI 14:5-17
    • (2009) Springer LNBPI , vol.14 , pp. 5-17
    • Governatori, G.1    Hoffmann, J.2    Sadiq, S.W.3    Weber, I.4
  • 20
    • 85024260157 scopus 로고    scopus 로고
    • Cloud computing
    • Hayes B (2009) Cloud computing. CommACM 51(7):9-11
    • (2009) CommACM , vol.51 , Issue.7 , pp. 9-11
    • Hayes, B.1
  • 21
    • 80051794669 scopus 로고    scopus 로고
    • Health insurance portability and accountability act
    • HIPAA
    • HIPAA (1996) Health insurance portability and accountability act. In: Congress of the USA
    • (1996) Congress of the USA
  • 22
    • 72949119514 scopus 로고    scopus 로고
    • Model-based reasoning on the achievement of business goals
    • ACM, New York
    • Höhn S (2009) Model-based reasoning on the achievement of business goals. In: ACM symposium on applied computing. ACM, New York, S 1589-1593
    • (2009) ACM Symposium on Applied Computing
    • Höhn, S.1
  • 24
    • 84856262444 scopus 로고    scopus 로고
    • BW2PN: BPEL+WSDL to Petri net transformation. Software tool developed at the University of Freiburg
    • IIG, Abruf am 2010-06-29
    • IIG (2010) BW2PN: BPEL+WSDL to Petri net transformation. Software tool developed at the University of Freiburg, IIG Telematics. http://www.telematik. uni-freiburg.de/ comcert/. Abruf am 2010-06-29
    • (2010) IIG Telematics
  • 26
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson B (1973) A note on the confinement problem. Commun ACM 16(10):613-615
    • (1973) Commun ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 27
    • 34247861351 scopus 로고    scopus 로고
    • A static compliance-checking framework for business process models
    • DOI 10.1147/sj.462.0335
    • Liu Y, Müller S, Xu K (2007) A static compliance-checking approach framework for business process models. IBM System Journal 46(2):335-361 (Pubitemid 46915268)
    • (2007) IBM Systems Journal , vol.46 , Issue.2 , pp. 335-361
    • Liu, Y.1    Muller, S.2    Xu, K.3
  • 32
    • 84882944120 scopus 로고    scopus 로고
    • Verifying business rules using a SMT solver for BPEL processes
    • Monakova G, Kopp O, Leymann F, Moser S, Schäfers K (2009) Verifying business rules using a SMT solver for BPEL processes. GI LNI 147:81-94
    • (2009) GI LNI , vol.147 , pp. 81-94
    • Monakova, G.1    Kopp, O.2    Leymann, F.3    Moser, S.4    Schäfers, K.5
  • 33
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis and applications
    • Murata T (1989) Petri nets: Properties, analysis and applications. Proc IEEE 77(4):541-580
    • (1989) Proc IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 35
    • 84856293412 scopus 로고    scopus 로고
    • Oryx Abruf am 2010-06-29
    • Oryx (2010) The Oryx project. http://bpt.hpi. uni-potsdam.de/Oryx/ WebHome. Abruf am 2010-06-29
    • The Oryx project
  • 38
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
    • Pretschner A, Hilty M, Basin D (2006) Distributed usage control. Comm ACM 49:39-44 (Pubitemid 44371759)
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 39
    • 38049150939 scopus 로고    scopus 로고
    • Modeling control objectives for business process compliance
    • Springer LNCS
    • Sadiq S, Governatori G, Namiri K (2007) Modeling control objectives for business process compliance. Business Process Management. Springer LNCS 4714:149-164
    • (2007) Business Process Management , vol.4714 , pp. 149-164
    • Sadiq, S.1    Governatori, G.2    Namiri, K.3
  • 40
    • 84856533305 scopus 로고    scopus 로고
    • A hitchhiker's guide to galaxy aka
    • Abruf am 2010-06-29
    • Saha D (2008) A hitchhiker's guide to galaxy a.k.a. Netweaver business process modelling. http://www.sdn.sap.com/irj/scn/ weblogs?blog=/pub/wlg/10947. Abruf am 2010-06-29
    • (2008) Netweaver Business Process Modelling
    • Saha, D.1
  • 41
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider F (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30-50
    • (2000) ACM Trans Inf Syst Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.1
  • 42
    • 84856539653 scopus 로고    scopus 로고
    • Sarbanes-Oxley act
    • SOX
    • SOX (2002) Sarbanes-Oxley act. In: Congress of the USA
    • (2002) Congress of the USA
  • 43
    • 0035627978 scopus 로고    scopus 로고
    • Workflow automation: Overview and research issues
    • Stohr EA, Zhao JL (2001) Workflow automation: Overview and research issues. Information Systems Frontiers 3(3):281-296
    • (2001) Information Systems Frontiers , vol.3 , Issue.3 , pp. 281-296
    • Stohr, E.A.1    Zhao, J.L.2
  • 44
    • 46849117330 scopus 로고    scopus 로고
    • Compliance proofs for collaborative interactions using aspect-oriented approach
    • Svirskas A, Courbis C, Molva R, Bedinskas J (2007) Compliance proofs for collaborative interactions using aspect-oriented approach. IEEE Congress on Services 1:33-40
    • (2007) IEEE Congress on Services , vol.1 , pp. 33-40
    • Svirskas, A.1    Courbis, C.2    Molva, R.3    Bedinskas, J.4
  • 47
    • 0002719897 scopus 로고    scopus 로고
    • The application of Petri nets to workflow management
    • van der Aalst WMP (1998) The application of Petri nets to workflow management. Journal of Circuits, Systems, and Computers 8(1):21-66 (Pubitemid 128540249)
    • (1998) Journal of Circuits, Systems and Computers , vol.8 , Issue.1 , pp. 21-66
    • Van Der Aalst, W.M.P.1
  • 48
    • 33646145999 scopus 로고    scopus 로고
    • Challenges in business process management: Verification of business processing using Petri nets
    • van der Aalst WMP (2003) Challenges in business process management: Verification of business processing using Petri nets. Bulletin of the EATCS 80:174-199
    • (2003) Bulletin of the EATCS , vol.80 , pp. 174-199
    • Van Der Aalst, W.M.P.1
  • 49
    • 34249010560 scopus 로고    scopus 로고
    • Verification of the SAP reference models using EPC reduction, state-space analysis, and invariants
    • DOI 10.1016/j.compind.2007.01.001, PII S0166361507000176
    • van Dongen BF, Jansen-Vullers MH, Verbeek HMW, van der Aalst WMP (2007) Verification of the SAP referencemodels using EPC reduction, state-space analysis, and invariants. Computers in Industry 58(6):578-601 (Pubitemid 46802841)
    • (2007) Computers in Industry , vol.58 , Issue.6 , pp. 578-601
    • Van Dongen, B.F.1    Jansen-Vullers, M.H.2    Verbeek, H.M.W.3    Van Der Aalst, W.M.P.4
  • 50
    • 85135370435 scopus 로고    scopus 로고
    • Howto design a general rule markup language
    • Wagner G (2002) Howto design a general rule markup language. GI LNI 14:19-37
    • (2002) GI LNI , vol.14 , pp. 19-37
    • Wagner, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.