Classification of domain-specific BPMN extensions
R Braun, W Esswein - The Practice of Enterprise Modeling: 7th IFIP WG 8.1 …, 2014 - Springer
BPMN is a standard for modeling business processes and provides meta model concepts for
the design of extensions. Thus, domain-specific extensions of the BPMN are facilitated. This …
the design of extensions. Thus, domain-specific extensions of the BPMN are facilitated. This …
Privacy-enhanced BPMN: enabling data privacy analysis in business processes models
Privacy-enhancing technologies play an important role in preventing the disclosure of
private data as information is transmitted and processed. Although business process model …
private data as information is transmitted and processed. Although business process model …
[HTML][HTML] Designing secure business processes for blockchains with SecBPMN2BC
Collaborative business processes can be seen as smart contracts, as they are oftentimes
adopted to express agreements among different organizations. Indeed, they provide …
adopted to express agreements among different organizations. Indeed, they provide …
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness
requirements are no exception. Importantly, undetected conflicts between such requirements …
requirements are no exception. Importantly, undetected conflicts between such requirements …
Modeling and verifying security policies in business processes
Modern information systems are large-sized and comprise multiple heterogeneous and
autonomous components. Autonomy enables decentralization, but it also implies that …
autonomous components. Autonomy enables decentralization, but it also implies that …
Designing secure business processes with SecBPMN
Modern information systems are increasingly large and consist of an interplay of technical
components and social actors (humans and organizations). Such interplay threatens the …
components and social actors (humans and organizations). Such interplay threatens the …
Recon: Scale-adaptive robust estimation via residual consensus
In this paper, we present a novel, threshold-free robust estimation framework capable of
efficiently fitting models to contaminated data. While RANSAC and its many variants have …
efficiently fitting models to contaminated data. While RANSAC and its many variants have …
A valid BPMN extension for supporting security requirements based on cyber security ontology
MEA Chergui, SM Benslimane - … , October 24–26, 2018, Proceedings 8, 2018 - Springer
Abstract Business Process Model and Notation (BPMN) is the de facto standard for business
process modeling. One of the most important aspect of business process models is security …
process modeling. One of the most important aspect of business process models is security …
A cyber security ontology for BPMN-security extensions
CL Maines, D Llewellyn-Jones… - … on computer and …, 2015 - ieeexplore.ieee.org
Every so often a paper is published presenting a new extension for modelling cyber security
requirements in Business Process Model and Notation (BPMN). The frequent production of …
requirements in Business Process Model and Notation (BPMN). The frequent production of …
Detecting conflicts between data-minimization and security requirements in business process models
Detecting conflicts between security and data-minimization requirements is a challenging
task. Since such conflicts arise in the specific context of how the technical and organizational …
task. Since such conflicts arise in the specific context of how the technical and organizational …