[HTML][HTML] Systematic literature review of security pattern research

H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

Information security vulnerability prediction based on business process model using machine learning approach

E Hariyanti, A Djunaidy, D Siahaan - Computers & Security, 2021 - Elsevier
Identifying information security vulnerabilities of a new business process resulting from a
business process redesign (BPR) must occur as early as possible. Organisations frequently …

On the security of business processes: classification of approaches, comparison, and research directions

A Farah, B Saida, OC Mourad - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Business processes are at the heart of companies and evolve constantly to cope with the
business needs. Considering the speed at which these changes occur, securing companies' …

Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach

AJ Varela-Vaca, RM Gasca - Information and Software Technology, 2013 - Elsevier
Abstract Context The use of Business Process Management Systems (BPMS) has emerged
in the IT arena for the automation of business processes. In the majority of cases, the issue …

Formalization of security patterns as a means to infer security controls in business processes

AJ Varela-Vaca, RM Gasca - Logic Journal of the IGPL, 2015 - ieeexplore.ieee.org
The growing trend towards the automation and externalization of business processes by
means of Technology Infrastructure (TI), such as Business Process Management Systems …

Automation of service-based security-aware business processes in the Cloud

F Lins, J Damasceno, R Medeiros, E Sousa, N Rosa - Computing, 2016 - Springer
The use of business process standards to model and execute business needs is growing
rapidly. In addition, Service-oriented Computing has been adopted to realize business …

Opbus: A framework for improving the dependability of risk-aware business processes

AJ Varela-Vaca - AI Communications, 2014 - journals.sagepub.com
Business processes and IT infrastructure have become a cornerstone for the management of
organizations. Nevertheless, business processes are ever threatened by problems due to …

[HTML][HTML] Adaptive modeling for security vulnerability propagation to predict the impact of business process redesign

A Djunaidy, E Hariyanti, D Siahaan - F1000Research, 2023 - f1000research.com
Background: Business process redesign (BPR) is typical in organizations and is followed by
adaptive maintenance on supporting applications. However, BPR leads to information …

A survey on automation of security requirements in service-based business processes

FAA Lins, ETG Sousa, NS Rosa - International Journal of …, 2018 - inderscienceonline.com
Service-oriented computing (SOC) and business process management (BPM) are essential
topics in computer science. Companies are widely adopting business process standards …

Hybrid Security Approach for Behavioural Privacy of Business Processes in a Cloud Environment

F Abdmeziem, S Boukhedouma… - … on Computational Science …, 2023 - Springer
Business processes are surely at the heart of companies but they are also the target of
numerous security attacks, especially when using nowadays technologies like Cloud …