Classification of domain-specific BPMN extensions

R Braun, W Esswein - The Practice of Enterprise Modeling: 7th IFIP WG 8.1 …, 2014 - Springer
BPMN is a standard for modeling business processes and provides meta model concepts for
the design of extensions. Thus, domain-specific extensions of the BPMN are facilitated. This …

Privacy-enhanced BPMN: enabling data privacy analysis in business processes models

P Pullonen, J Tom, R Matulevičius, A Toots - Software and Systems …, 2019 - Springer
Privacy-enhancing technologies play an important role in preventing the disclosure of
private data as information is transmitted and processed. Although business process model …

[HTML][HTML] Designing secure business processes for blockchains with SecBPMN2BC

J Köpke, G Meroni, M Salnitri - Future Generation Computer Systems, 2023 - Elsevier
Collaborative business processes can be seen as smart contracts, as they are oftentimes
adopted to express agreements among different organizations. Indeed, they provide …

A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements

Q Ramadan, D Strüber, M Salnitri, J Jürjens… - Software and Systems …, 2020 - Springer
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness
requirements are no exception. Importantly, undetected conflicts between such requirements …

Modeling and verifying security policies in business processes

M Salnitri, F Dalpiaz, P Giorgini - International Workshop on Business …, 2014 - Springer
Modern information systems are large-sized and comprise multiple heterogeneous and
autonomous components. Autonomy enables decentralization, but it also implies that …

Designing secure business processes with SecBPMN

M Salnitri, F Dalpiaz, P Giorgini - Software & Systems Modeling, 2017 - Springer
Modern information systems are increasingly large and consist of an interplay of technical
components and social actors (humans and organizations). Such interplay threatens the …

Recon: Scale-adaptive robust estimation via residual consensus

R Raguram, JM Frahm - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
In this paper, we present a novel, threshold-free robust estimation framework capable of
efficiently fitting models to contaminated data. While RANSAC and its many variants have …

A valid BPMN extension for supporting security requirements based on cyber security ontology

MEA Chergui, SM Benslimane - … , October 24–26, 2018, Proceedings 8, 2018 - Springer
Abstract Business Process Model and Notation (BPMN) is the de facto standard for business
process modeling. One of the most important aspect of business process models is security …

A cyber security ontology for BPMN-security extensions

CL Maines, D Llewellyn-Jones… - … on computer and …, 2015 - ieeexplore.ieee.org
Every so often a paper is published presenting a new extension for modelling cyber security
requirements in Business Process Model and Notation (BPMN). The frequent production of …

Detecting conflicts between data-minimization and security requirements in business process models

Q Ramadan, D Strüber, M Salnitri, V Riediger… - … and Applications: 14th …, 2018 - Springer
Detecting conflicts between security and data-minimization requirements is a challenging
task. Since such conflicts arise in the specific context of how the technical and organizational …