[HTML][HTML] Security and privacy concerns in cloud-based scientific and business workflows: A systematic review
Today, the number of data-intensive and compute-intensive applications like business and
scientific workflows has dramatically increased, which made cloud computing more popular …
scientific workflows has dramatically increased, which made cloud computing more popular …
Information systems as representations: A review of the theory and evidence
J Recker, M Indulska, P Green… - Journal of the …, 2019 - aisel.aisnet.org
Abstract Representation theory proposes that the basic purpose of an information system
(IS) is to faithfully represent certain real-world phenomena, allowing users to reason about …
(IS) is to faithfully represent certain real-world phenomena, allowing users to reason about …
BPRIM: An integrated framework for business process management and risk management
Enterprise engineering deals with the design of processes which aim to improve the
structure and efficiency of business organizations. It develops approaches based on …
structure and efficiency of business organizations. It develops approaches based on …
[HTML][HTML] Addressing insider attacks via forensic-ready risk management
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
Classification of domain-specific BPMN extensions
R Braun, W Esswein - The Practice of Enterprise Modeling: 7th IFIP WG 8.1 …, 2014 - Springer
BPMN is a standard for modeling business processes and provides meta model concepts for
the design of extensions. Thus, domain-specific extensions of the BPMN are facilitated. This …
the design of extensions. Thus, domain-specific extensions of the BPMN are facilitated. This …
Privacy-enhanced BPMN: enabling data privacy analysis in business processes models
Privacy-enhancing technologies play an important role in preventing the disclosure of
private data as information is transmitted and processed. Although business process model …
private data as information is transmitted and processed. Although business process model …
Achieving GDPR compliance of BPMN process models
In an increasingly digital world, where processing and exchange of personal data are key
parts of everyday enterprise business processes (BPs), the right to data privacy is regulated …
parts of everyday enterprise business processes (BPs), the right to data privacy is regulated …
Automated threat modelling and risk analysis in e-Government using BPMN
Recent progress integrates security requirements into BPMN, enhancing its framework.
Extensions aim to seamlessly embed security concepts, yet the inherent ambiguity of …
Extensions aim to seamlessly embed security concepts, yet the inherent ambiguity of …
Risk-aware business process management using multi-view modeling: method and tool
Abstract Risk-aware Business Process Management (R-BPM) has been addressed in
research since more than a decade. However, the integration of the two independent …
research since more than a decade. However, the integration of the two independent …
PE-BPMN: privacy-enhanced business process model and notation
Abstract Privacy Enhancing Technologies (PETs) play an important role in preventing
privacy leakage of data along information flows. Although business process modelling is …
privacy leakage of data along information flows. Although business process modelling is …