A systematic literature review on BPMN extensions

K Zarour, D Benmerzoug, N Guermouche… - Business Process …, 2020 - emerald.com
Purpose Business Process Model and Notation (BPMN) is a generic language that is often
extended by researchers, either for dealing with processes of specific domains or for …

[HTML][HTML] Security and privacy concerns in cloud-based scientific and business workflows: A systematic review

N Soveizi, F Turkmen, D Karastoyanova - Future Generation Computer …, 2023 - Elsevier
Today, the number of data-intensive and compute-intensive applications like business and
scientific workflows has dramatically increased, which made cloud computing more popular …

Privacy-enhanced BPMN: enabling data privacy analysis in business processes models

P Pullonen, J Tom, R Matulevičius, A Toots - Software and Systems …, 2019 - Springer
Privacy-enhancing technologies play an important role in preventing the disclosure of
private data as information is transmitted and processed. Although business process model …

[HTML][HTML] Designing secure business processes for blockchains with SecBPMN2BC

J Köpke, G Meroni, M Salnitri - Future Generation Computer Systems, 2023 - Elsevier
Collaborative business processes can be seen as smart contracts, as they are oftentimes
adopted to express agreements among different organizations. Indeed, they provide …

Achieving GDPR compliance of BPMN process models

S Agostinelli, FM Maggi, A Marrella, F Sapio - … 2019, Rome, Italy, June 3–7 …, 2019 - Springer
In an increasingly digital world, where processing and exchange of personal data are key
parts of everyday enterprise business processes (BPs), the right to data privacy is regulated …

A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements

Q Ramadan, D Strüber, M Salnitri, J Jürjens… - Software and Systems …, 2020 - Springer
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness
requirements are no exception. Importantly, undetected conflicts between such requirements …

Conceptual representation of the GDPR: model and application directions

J Tom, E Sing, R Matulevičius - … , September 24-26, 2018, Proceedings 17, 2018 - Springer
With the GDPR coming into force in 2018, organizations require techniques to assess and
improve the current state of their data processing activities with regards to personal data …

Business process outsourcing to the cloud: Balancing costs with security risks

AA Nacer, C Godart, G Rosinosky, A Tari, S Youcef - Computers in industry, 2019 - Elsevier
The cloud computing introduced security risks which make companies reluctant to adopt it.
Some means exist for reducing these risks while deploying a business process (BP) in the …

Evaluating a privacy requirements specification method by using a mixed-method approach: results and lessons learned

M Peixoto, C Silva, J Araújo, T Gorschek… - Requirements …, 2023 - Springer
Although agile software development (ASD) has been adopted in the industry, requirements
approaches for ASD still neglect non-functional requirements. Privacy has become a …

Privacy-enhanced system design modeling based on privacy features

AS Ahmadian, D Strüber, J Jürjens - Proceedings of the 34th ACM …, 2019 - dl.acm.org
To ensure that their stakeholders' privacy concerns are addressed systematically from the
early development phases, organizations can perform a privacy enhancement of the system …