A systematic literature review on BPMN extensions
K Zarour, D Benmerzoug, N Guermouche… - Business Process …, 2020 - emerald.com
Purpose Business Process Model and Notation (BPMN) is a generic language that is often
extended by researchers, either for dealing with processes of specific domains or for …
extended by researchers, either for dealing with processes of specific domains or for …
[HTML][HTML] Security and privacy concerns in cloud-based scientific and business workflows: A systematic review
Today, the number of data-intensive and compute-intensive applications like business and
scientific workflows has dramatically increased, which made cloud computing more popular …
scientific workflows has dramatically increased, which made cloud computing more popular …
Privacy-enhanced BPMN: enabling data privacy analysis in business processes models
Privacy-enhancing technologies play an important role in preventing the disclosure of
private data as information is transmitted and processed. Although business process model …
private data as information is transmitted and processed. Although business process model …
[HTML][HTML] Designing secure business processes for blockchains with SecBPMN2BC
Collaborative business processes can be seen as smart contracts, as they are oftentimes
adopted to express agreements among different organizations. Indeed, they provide …
adopted to express agreements among different organizations. Indeed, they provide …
Achieving GDPR compliance of BPMN process models
In an increasingly digital world, where processing and exchange of personal data are key
parts of everyday enterprise business processes (BPs), the right to data privacy is regulated …
parts of everyday enterprise business processes (BPs), the right to data privacy is regulated …
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness
requirements are no exception. Importantly, undetected conflicts between such requirements …
requirements are no exception. Importantly, undetected conflicts between such requirements …
Conceptual representation of the GDPR: model and application directions
J Tom, E Sing, R Matulevičius - … , September 24-26, 2018, Proceedings 17, 2018 - Springer
With the GDPR coming into force in 2018, organizations require techniques to assess and
improve the current state of their data processing activities with regards to personal data …
improve the current state of their data processing activities with regards to personal data …
Business process outsourcing to the cloud: Balancing costs with security risks
The cloud computing introduced security risks which make companies reluctant to adopt it.
Some means exist for reducing these risks while deploying a business process (BP) in the …
Some means exist for reducing these risks while deploying a business process (BP) in the …
Evaluating a privacy requirements specification method by using a mixed-method approach: results and lessons learned
Although agile software development (ASD) has been adopted in the industry, requirements
approaches for ASD still neglect non-functional requirements. Privacy has become a …
approaches for ASD still neglect non-functional requirements. Privacy has become a …
Privacy-enhanced system design modeling based on privacy features
To ensure that their stakeholders' privacy concerns are addressed systematically from the
early development phases, organizations can perform a privacy enhancement of the system …
early development phases, organizations can perform a privacy enhancement of the system …