[HTML][HTML] Systematic literature review of security pattern research
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
Information security vulnerability prediction based on business process model using machine learning approach
Identifying information security vulnerabilities of a new business process resulting from a
business process redesign (BPR) must occur as early as possible. Organisations frequently …
business process redesign (BPR) must occur as early as possible. Organisations frequently …
On the security of business processes: classification of approaches, comparison, and research directions
Business processes are at the heart of companies and evolve constantly to cope with the
business needs. Considering the speed at which these changes occur, securing companies' …
business needs. Considering the speed at which these changes occur, securing companies' …
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
AJ Varela-Vaca, RM Gasca - Information and Software Technology, 2013 - Elsevier
Abstract Context The use of Business Process Management Systems (BPMS) has emerged
in the IT arena for the automation of business processes. In the majority of cases, the issue …
in the IT arena for the automation of business processes. In the majority of cases, the issue …
Formalization of security patterns as a means to infer security controls in business processes
AJ Varela-Vaca, RM Gasca - Logic Journal of the IGPL, 2015 - ieeexplore.ieee.org
The growing trend towards the automation and externalization of business processes by
means of Technology Infrastructure (TI), such as Business Process Management Systems …
means of Technology Infrastructure (TI), such as Business Process Management Systems …
Automation of service-based security-aware business processes in the Cloud
The use of business process standards to model and execute business needs is growing
rapidly. In addition, Service-oriented Computing has been adopted to realize business …
rapidly. In addition, Service-oriented Computing has been adopted to realize business …
Opbus: A framework for improving the dependability of risk-aware business processes
AJ Varela-Vaca - AI Communications, 2014 - journals.sagepub.com
Business processes and IT infrastructure have become a cornerstone for the management of
organizations. Nevertheless, business processes are ever threatened by problems due to …
organizations. Nevertheless, business processes are ever threatened by problems due to …
[HTML][HTML] Adaptive modeling for security vulnerability propagation to predict the impact of business process redesign
Background: Business process redesign (BPR) is typical in organizations and is followed by
adaptive maintenance on supporting applications. However, BPR leads to information …
adaptive maintenance on supporting applications. However, BPR leads to information …
A survey on automation of security requirements in service-based business processes
Service-oriented computing (SOC) and business process management (BPM) are essential
topics in computer science. Companies are widely adopting business process standards …
topics in computer science. Companies are widely adopting business process standards …
Hybrid Security Approach for Behavioural Privacy of Business Processes in a Cloud Environment
F Abdmeziem, S Boukhedouma… - … on Computational Science …, 2023 - Springer
Business processes are surely at the heart of companies but they are also the target of
numerous security attacks, especially when using nowadays technologies like Cloud …
numerous security attacks, especially when using nowadays technologies like Cloud …