Securing business processes using security risk-oriented patterns

N Ahmed, R Matulevičius - Computer Standards & Interfaces, 2014 - Elsevier
Business process modelling and security engineering are two important concerns when
developing information system. However current practices report that security is addressed …

A maturity model for secure requirements engineering

M Niazi, AM Saeed, M Alshayeb, S Mahmood… - Computers & …, 2020 - Elsevier
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …

Automatic verification and diagnosis of security risk assessments in business process models

ÁJ Varela-Vaca, L Parody, RM Gasca… - IEEE …, 2019 - ieeexplore.ieee.org
Organizations execute daily activities to meet their objectives. The performance of these
activities can be fundamental for achieving a business objective, but they also imply the …

[HTML][HTML] A compliance assessment system for Incident Management process

A Palma, G Acitelli, A Marrella, S Bonomi… - Computers & Security, 2024 - Elsevier
Abstract The Incident Management (IM) process is one of the core activities for increasing
the overall security level of organizations and better responding to cyber attacks. Different …

riskaBPMN-a BPMN extension for risk assessment

P Cardoso, A Respício, D Domingos - Procedia Computer Science, 2021 - Elsevier
The growth in use of business processes (BP) in critical systems, vital to create or maintain
business value in organizations, has driven the need and interest in assessing their risk. For …

BenchIMP: A benchmark for quantitative evaluation of the incident management process assessment

A Palma, N Bartoloni, M Angelini - Proceedings of the 19th International …, 2024 - dl.acm.org
In the current scenario, where cyber-incidents occur daily, an effective Incident Management
Process (IMP) and its assessment have assumed paramount significance. While …

Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach

AJ Varela-Vaca, RM Gasca - Information and Software Technology, 2013 - Elsevier
Abstract Context The use of Business Process Management Systems (BPMS) has emerged
in the IT arena for the automation of business processes. In the majority of cases, the issue …

Representing threats in BPMN 2.0

PH Meland, EA Gjære - 2012 seventh international conference …, 2012 - ieeexplore.ieee.org
The Business Process Modeling Notation (BPMN) has become a broadly accepted standard
for process modeling, but is mostly being used to express the normal execution flow of …

A taxonomy for assessing security in business process modelling

N Ahmed, R Matulevičius - IEEE 7th International Conference …, 2013 - ieeexplore.ieee.org
The idea of business processes as a key concept to underpin organisational activities are
increasingly recognised. Business processes must be able to accommodate security …

A security pattern-driven approach toward the automation of risk treatment in business processes

AJ Varela-Vaca, R Warschofsky, RM Gasca… - … Joint Conference CISIS' …, 2013 - Springer
Risk management has become an essential mechanism for business and security analysts,
since it enable the identification, evaluation and treatment of any threats, vulnerabilities, and …