[HTML][HTML] Security and privacy concerns in cloud-based scientific and business workflows: A systematic review

N Soveizi, F Turkmen, D Karastoyanova - Future Generation Computer …, 2023 - Elsevier
Today, the number of data-intensive and compute-intensive applications like business and
scientific workflows has dramatically increased, which made cloud computing more popular …

Information systems as representations: A review of the theory and evidence

J Recker, M Indulska, P Green… - Journal of the …, 2019 - aisel.aisnet.org
Abstract Representation theory proposes that the basic purpose of an information system
(IS) is to faithfully represent certain real-world phenomena, allowing users to reason about …

BPRIM: An integrated framework for business process management and risk management

E Lamine, R Thabet, A Sienou, D Bork, F Fontanili… - Computers in …, 2020 - Elsevier
Enterprise engineering deals with the design of processes which aim to improve the
structure and efficiency of business organizations. It develops approaches based on …

[HTML][HTML] Addressing insider attacks via forensic-ready risk management

L Daubner, M Macak, R Matulevičius… - Journal of Information …, 2023 - Elsevier
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …

Classification of domain-specific BPMN extensions

R Braun, W Esswein - The Practice of Enterprise Modeling: 7th IFIP WG 8.1 …, 2014 - Springer
BPMN is a standard for modeling business processes and provides meta model concepts for
the design of extensions. Thus, domain-specific extensions of the BPMN are facilitated. This …

Privacy-enhanced BPMN: enabling data privacy analysis in business processes models

P Pullonen, J Tom, R Matulevičius, A Toots - Software and Systems …, 2019 - Springer
Privacy-enhancing technologies play an important role in preventing the disclosure of
private data as information is transmitted and processed. Although business process model …

Achieving GDPR compliance of BPMN process models

S Agostinelli, FM Maggi, A Marrella, F Sapio - … 2019, Rome, Italy, June 3–7 …, 2019 - Springer
In an increasingly digital world, where processing and exchange of personal data are key
parts of everyday enterprise business processes (BPs), the right to data privacy is regulated …

Automated threat modelling and risk analysis in e-Government using BPMN

D Granata, M Rak, G Salzillo, G Di Guida… - Connection …, 2023 - Taylor & Francis
Recent progress integrates security requirements into BPMN, enhancing its framework.
Extensions aim to seamlessly embed security concepts, yet the inherent ambiguity of …

Risk-aware business process management using multi-view modeling: method and tool

R Thabet, D Bork, A Boufaied, E Lamine… - Requirements …, 2021 - Springer
Abstract Risk-aware Business Process Management (R-BPM) has been addressed in
research since more than a decade. However, the integration of the two independent …

PE-BPMN: privacy-enhanced business process model and notation

P Pullonen, R Matulevičius, D Bogdanov - Business Process Management …, 2017 - Springer
Abstract Privacy Enhancing Technologies (PETs) play an important role in preventing
privacy leakage of data along information flows. Although business process modelling is …