Towards a Business Process-Driven Framework for Security Engineering with the UML
@inproceedings{Vivas2003TowardsAB, title={Towards a Business Process-Driven Framework for Security Engineering with the UML}, author={Jos{\'e} Luis Vivas and Jos{\'e} A. Montenegro and Javier L{\'o}pez}, booktitle={ISC}, year={2003} }
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is commonly at the business process level that customers and end users are able to express their security needs. In addition, systems are often developed by automating existing manual business processes. Since many security notions belongs conceptually to the world of business processes, it is…
24 Citations
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
- Computer ScienceTrustBus
- 2006
A description of the UML 2.0 extension for modeling secure business process through activity diagrams is described and this approach is applied to a typical health-care business process.
A BPMN Extension for the Modeling of Security Requirements in Business Processes
- Computer ScienceIEICE Trans. Inf. Syst.
- 2007
The Business Process Modeling Notation extension for modeling secure business process through Business Process Diagrams is summarized and an approach to a typical health-care business process is applied.
Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile
- Computer ScienceER
- 2006
A microprocess is shown through which it is possible to specify and refine security requirements at a high level of abstraction, in a way that they can be incorporated into the development of a software system.
Model-based Security Engineering of Electronic Business Processes
- Computer Science, Business
- 2015
A security engineering framework in the domain of business process management that bridges the gap between business process models on one side and the design of proper controls and their configuration on the other side is developed.
Secure business process model specification through a UML 2.0 activity diagram profile
- Computer ScienceDecis. Support Syst.
- 2011
Secure Business Processes defined through a UML 2.0 extension
- Computer ScienceIEEE Latin America Transactions
- 2008
This paper presents an extension of the UML 2.0 Activity Diagram which allows to specify security requirements in BP and applies it in a typical business process related to a patient admission in health-care institution.
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach
- Computer ScienceInf. Softw. Technol.
- 2010
Security modeling for service-oriented systems using security pattern refinement approach
- Computer ScienceSoftware & Systems Modeling
- 2012
A pattern refinement approach for security modeling to achieve configurable and declarative security, based on the principles of abstraction, refinement, separation-of-concerns and maintainability to achieve flexible configurations of SOA security is proposed.
Designing secure business processes from organisational goal models
- Computer Science
- 2018
This work introduces a framework for the design of secure business process models that uses security-oriented goal models as its starting point to capture a socio-technical view of the system to-be and its security requirements during its early design stages.
Specification and formal verification of security requirements
- Computer ScienceCompSysTech '04
- 2004
This work proposes including security requirements at the top level of development process, together with functional requirements because they are much related, to extract all communication protocols that are involved in the authors' application and their associated security goals.
References
SHOWING 1-10 OF 33 REFERENCES
Integrating Security Policy Design into the Software Development Process Technical Report B – 01 – 06
- Computer Science
- 2001
The paper shows how existing UML model elements can be use d to specify access control policies for distributed object systems and proposes the automatic generation of a policy specification to configure a CORBA-based infrastructure for view-based access control.
Towards Development of Secure Systems Using UMLsec
- Computer ScienceFASE
- 2001
This work exemplifies use of the extension mechanisms of UML and of a (simplified) formal semantics for it to enable developers to make use of established knowledge on security engineering through the means of a widely used notation.
Using abuse case models for security requirements analysis
- Computer ScienceProceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
- 1999
A proven object oriented modeling technique is adapted, use cases, to capture and analyze security requirements in a simple way, and its relationship to other security engineering work products is relatively simple, from a user perspective.
Dealing with Security Requirements During the Development of Information Systems
- Computer ScienceCAiSE
- 1993
Treating security requirements as a class of NFRs is applied to designing secure ISs, which allows reusing generic design knowledge, detecting goal interactions, capturing and reasoning about design rationale, and assessing the degree of goal achievement.
Eliciting security requirements by misuse cases
- Computer ScienceProceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000
- 2000
This paper suggests how this can be done, extending the diagrams with misuse cases, which makes it possible to represent actions that the system should prevent, together with those actions which it should support.
A language for modelling secure business transactions
- Computer ScienceProceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
- 1999
This work presents a methodology to specify secure protocols, which are usable to automatically conduct business processes, as well as market transactions, that are suitable for specifying and conducting market transactions.
A New Paradigm for Adding Security Into IS Development Methods
- Computer ScienceConference on Information Security Management & Small Systems Security
- 2001
This paper describes a framework that helps to understand the fundamental barriers preventing the alternative SIS design approaches from more effectively addressing shortcomings, and illustrated with an example of a framework-based solution: meta-notation for adding security into IS development methods.
Business Modeling With UML: Business Patterns at Work
- Computer Science
- 2000
Key business modeling concepts are presented, including how to define Business Rules with UML's Object Constraint Language (OCL) and how to use business models with use cases.
An empirical study of industrial security-engineering practices
- Computer ScienceJ. Syst. Softw.
- 2002