Skip to main content
Top
Published in: WIRTSCHAFTSINFORMATIK 3/2011

01-06-2011 | Aufsatz

Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse

Authors: Dr. Rafael Accorsi, Dipl.-Inf. Lutz Lowis, Yoshinori Sato

Published in: WIRTSCHAFTSINFORMATIK | Issue 3/2011

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

Die in wachsendem Ausmaß geforderte Compliance von Geschäftsprozessen kann beim Cloud-Computing bisher – wenn überhaupt – nur mit großem, manuellem Aufwand nachgewiesen werden. Ohne entsprechende Zertifizierung werden aber viele Interessenten keine Cloud-basierten Geschäftsprozesse einsetzen. Der Beitrag stellt ein neues Verfahren zur automatisierten Compliance-Prüfung von Prozessen vor, bei dem Prozesse und Regeln als Petrinetze formalisiert werden. Außerdem wird eine Klassifikation von Compliance-Anforderungen aufgestellt, aus der Muster für die Prüfung abgeleitet werden. Anhand der Muster werden Evidenzen bezüglich der Regeleinhaltung automatisiert erzeugt.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Show more products
Literature
go back to reference Accorsi R, Wonnemann C (2011) Strong non-leak guarantees for workflow models. ACM, SACS, S. 308–314 Accorsi R, Wonnemann C (2011) Strong non-leak guarantees for workflow models. ACM, SACS, S. 308–314
go back to reference Atluri V, Chun SA, Mazzoleni P (2001) A Chinese wall security model for decentralized workflow systems. ACM conference on computer and communications security. ACM, New York, S 48–57 Atluri V, Chun SA, Mazzoleni P (2001) A Chinese wall security model for decentralized workflow systems. ACM conference on computer and communications security. ACM, New York, S 48–57
go back to reference BDSG (2009) Bundesdatenschutzgesetz. German Federal Ministry of Justice BDSG (2009) Bundesdatenschutzgesetz. German Federal Ministry of Justice
go back to reference Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Software Eng 34(1):5–20 CrossRef Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Software Eng 34(1):5–20 CrossRef
go back to reference Breaux TD (2009) Legal requirements acquisition for the specification of legally compliant information systems. PhD thesis, North Carolina State University Breaux TD (2009) Legal requirements acquisition for the specification of legally compliant information systems. PhD thesis, North Carolina State University
go back to reference Cabanillas C, Resinas M, Ruiz-Cortés A (2010) Hints on how to face business process compliance. In: Resinas M, Ruiz-Cortés A, Pastor JA, Sancho MR (Hrsg) Proc JISBD 4, S 26–32 Cabanillas C, Resinas M, Ruiz-Cortés A (2010) Hints on how to face business process compliance. In: Resinas M, Ruiz-Cortés A, Pastor JA, Sancho MR (Hrsg) Proc JISBD 4, S 26–32
go back to reference Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proc 2009 ACM workshop on cloud computing security. ACM, New York, S 85–90 CrossRef Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proc 2009 ACM workshop on cloud computing security. ACM, New York, S 85–90 CrossRef
go back to reference COMPAS (2008) Compliance-driven models, languages, and architectures for services. EU FP7 Project 215175, deliverable 2.1 “State of the art in the field of compliance languages” COMPAS (2008) Compliance-driven models, languages, and architectures for services. EU FP7 Project 215175, deliverable 2.1 “State of the art in the field of compliance languages”
go back to reference Curtis B, Kellner MI, Over J (1992) Process modeling. Comm ACM 35(9):75–90 CrossRef Curtis B, Kellner MI, Over J (1992) Process modeling. Comm ACM 35(9):75–90 CrossRef
go back to reference Dijkman R, Dumas M, Ouyang C (2008) Semantics and analysis of business process models in BPMN. Information & Software Technology 50(12):1281–1294 CrossRef Dijkman R, Dumas M, Ouyang C (2008) Semantics and analysis of business process models in BPMN. Information & Software Technology 50(12):1281–1294 CrossRef
go back to reference Ehrig M, Koschmider A, Oberweis A (2007) Measuring similarity between semantic business process models. ACS CRPIT 67:71–80 Ehrig M, Koschmider A, Oberweis A (2007) Measuring similarity between semantic business process models. ACS CRPIT 67:71–80
go back to reference Etro F (2009) The economic impact of cloud computing on business creation, employment and output in Europe. Review of Business and Economics 54(2):179–218 Etro F (2009) The economic impact of cloud computing on business creation, employment and output in Europe. Review of Business and Economics 54(2):179–218
go back to reference European Commission (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data European Commission (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data
go back to reference ENISA (2009) Cloud computing – benefits, risks and recommendations for information security. European Network Information and Security Agency ENISA (2009) Cloud computing – benefits, risks and recommendations for information security. European Network Information and Security Agency
go back to reference Ghose A, Koliadis G (2007) Auditing business process compliance. Springer LNCS 4749:168–180 Ghose A, Koliadis G (2007) Auditing business process compliance. Springer LNCS 4749:168–180
go back to reference GLB (1999) Gramm-Leach-Bliley Act. In: Congress of the USA GLB (1999) Gramm-Leach-Bliley Act. In: Congress of the USA
go back to reference Governatori G, Hoffmann J, Sadiq SW, Weber I (2009) Detecting regulatory compliance for business process models through semantic annotations. Springer LNBPI 14:5–17 Governatori G, Hoffmann J, Sadiq SW, Weber I (2009) Detecting regulatory compliance for business process models through semantic annotations. Springer LNBPI 14:5–17
go back to reference HIPAA (1996) Health insurance portability and accountability act. In: Congress of the USA HIPAA (1996) Health insurance portability and accountability act. In: Congress of the USA
go back to reference Höhn S (2009) Model-based reasoning on the achievement of business goals. In: ACM symposium on applied computing. ACM, New York, S 1589–1593 Höhn S (2009) Model-based reasoning on the achievement of business goals. In: ACM symposium on applied computing. ACM, New York, S 1589–1593
go back to reference Huang H, Kirchner H (2009) Component-based security policy design with colored Petri nets. Springer LNCS 5700:21–42 Huang H, Kirchner H (2009) Component-based security policy design with colored Petri nets. Springer LNCS 5700:21–42
go back to reference Katt B, Zhang X, Hafner M (2009) Towards a usage control policy specification with Petri nets. Springer LNCS 5871:905–912 Katt B, Zhang X, Hafner M (2009) Towards a usage control policy specification with Petri nets. Springer LNCS 5871:905–912
go back to reference Lampson B (1973) A note on the confinement problem. Commun ACM 16(10):613–615 CrossRef Lampson B (1973) A note on the confinement problem. Commun ACM 16(10):613–615 CrossRef
go back to reference Liu Y, Müller S, Xu K (2007) A static compliance-checking approach framework for business process models. IBM System Journal 46(2):335–361 CrossRef Liu Y, Müller S, Xu K (2007) A static compliance-checking approach framework for business process models. IBM System Journal 46(2):335–361 CrossRef
go back to reference Liu R, Kumar A (2005) An analysis and taxonomy of unstructured workflows. Springer LNCS 3649:268–284 Liu R, Kumar A (2005) An analysis and taxonomy of unstructured workflows. Springer LNCS 3649:268–284
go back to reference Lohmann N, Verbeek E, Dijkman RM (2009) Petri net transformations for business processes – A survey. Springer LNCS 5460:46–63 Lohmann N, Verbeek E, Dijkman RM (2009) Petri net transformations for business processes – A survey. Springer LNCS 5460:46–63
go back to reference Lowis L, Accorsi R (2010) Vulnerability analysis in SOA-based business processes. IEEE Transactions on Services Computing (in press) Lowis L, Accorsi R (2010) Vulnerability analysis in SOA-based business processes. IEEE Transactions on Services Computing (in press)
go back to reference Meda HS, Sen AK, Bagchi A (2010) On detecting data flow errors in workflows. Journal of Data and Information Quality 2(1):1–31 CrossRef Meda HS, Sen AK, Bagchi A (2010) On detecting data flow errors in workflows. Journal of Data and Information Quality 2(1):1–31 CrossRef
go back to reference Monakova G, Kopp O, Leymann F, Moser S, Schäfers K (2009) Verifying business rules using a SMT solver for BPEL processes. GI LNI 147:81–94 Monakova G, Kopp O, Leymann F, Moser S, Schäfers K (2009) Verifying business rules using a SMT solver for BPEL processes. GI LNI 147:81–94
go back to reference Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541–580 CrossRef Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541–580 CrossRef
go back to reference Organisation for Economic Co-Operation and Development (OECD) (1980) OECD guidelines on the protection of privacy and transborder flows of personal data Organisation for Economic Co-Operation and Development (OECD) (1980) OECD guidelines on the protection of privacy and transborder flows of personal data
go back to reference Ouyang C, Verbeek E, van der Aalst WMP, Breutel S, Dumas M, ter Hofstede AHM (2005) WofBPEL: a tool for automated analysis of BPEL processes. Springer LNCS 3826:484–489 Ouyang C, Verbeek E, van der Aalst WMP, Breutel S, Dumas M, ter Hofstede AHM (2005) WofBPEL: a tool for automated analysis of BPEL processes. Springer LNCS 3826:484–489
go back to reference Park J, Sandhu R (2004) The UCONABC usage control model. ACM Transactions on Information and System Security 7:128–174 CrossRef Park J, Sandhu R (2004) The UCONABC usage control model. ACM Transactions on Information and System Security 7:128–174 CrossRef
go back to reference Pretschner A, Hilty M, Basin D (2006) Distributed usage control. Comm ACM 49:39–44 CrossRef Pretschner A, Hilty M, Basin D (2006) Distributed usage control. Comm ACM 49:39–44 CrossRef
go back to reference Sadiq S, Governatori G, Namiri K (2007) Modeling control objectives for business process compliance. Business Process Management. Springer LNCS 4714:149–164 Sadiq S, Governatori G, Namiri K (2007) Modeling control objectives for business process compliance. Business Process Management. Springer LNCS 4714:149–164
go back to reference Schneider F (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30–50 CrossRef Schneider F (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30–50 CrossRef
go back to reference SOX (2002) Sarbanes-Oxley act. In: Congress of the USA SOX (2002) Sarbanes-Oxley act. In: Congress of the USA
go back to reference Stohr EA, Zhao JL (2001) Workflow automation: overview and research issues. Information Systems Frontiers 3(3):281–296 CrossRef Stohr EA, Zhao JL (2001) Workflow automation: overview and research issues. Information Systems Frontiers 3(3):281–296 CrossRef
go back to reference Svirskas A, Courbis C, Molva R, Bedžinskas J (2007) Compliance proofs for collaborative interactions using aspect-oriented approach. IEEE Congress on Services 1:33–40 CrossRef Svirskas A, Courbis C, Molva R, Bedžinskas J (2007) Compliance proofs for collaborative interactions using aspect-oriented approach. IEEE Congress on Services 1:33–40 CrossRef
go back to reference TMG (2009) Telemediengesetz. German Federal Ministry of Justice TMG (2009) Telemediengesetz. German Federal Ministry of Justice
go back to reference Trčka N, van der Aalst WMP, Sidorova N (2009) Data-flow anti-patterns: discovering data-flow errors in workflows. Springer LNCS 5565:425–439 Trčka N, van der Aalst WMP, Sidorova N (2009) Data-flow anti-patterns: discovering data-flow errors in workflows. Springer LNCS 5565:425–439
go back to reference van der Aalst WMP (1998) The application of Petri nets to workflow management. Journal of Circuits, Systems, and Computers 8(1):21–66 CrossRef van der Aalst WMP (1998) The application of Petri nets to workflow management. Journal of Circuits, Systems, and Computers 8(1):21–66 CrossRef
go back to reference van der Aalst WMP (2003) Challenges in business process management: verification of business processing using Petri nets. Bulletin of the EATCS 80:174–199 van der Aalst WMP (2003) Challenges in business process management: verification of business processing using Petri nets. Bulletin of the EATCS 80:174–199
go back to reference van Dongen BF, Jansen-Vullers MH, Verbeek HMW, van der Aalst WMP (2007) Verification of the SAP reference models using EPC reduction, state-space analysis, and invariants. Computers in Industry 58(6):578–601 CrossRef van Dongen BF, Jansen-Vullers MH, Verbeek HMW, van der Aalst WMP (2007) Verification of the SAP reference models using EPC reduction, state-space analysis, and invariants. Computers in Industry 58(6):578–601 CrossRef
go back to reference Wagner G (2002) How to design a general rule markup language. GI LNI 14:19–37 Wagner G (2002) How to design a general rule markup language. GI LNI 14:19–37
go back to reference Wong PYH, Gibbons J (2008) Verifying business process compatibility. In: International conference on quality software. IEEE, S 126–131 CrossRef Wong PYH, Gibbons J (2008) Verifying business process compatibility. In: International conference on quality software. IEEE, S 126–131 CrossRef
Metadata
Title
Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse
Authors
Dr. Rafael Accorsi
Dipl.-Inf. Lutz Lowis
Yoshinori Sato
Publication date
01-06-2011
Publisher
SP Gabler Verlag
Published in
WIRTSCHAFTSINFORMATIK / Issue 3/2011
Print ISSN: 0937-6429
Electronic ISSN: 1861-8936
DOI
https://doi.org/10.1007/s11576-011-0269-z

Other articles of this Issue 3/2011

WIRTSCHAFTSINFORMATIK 3/2011 Go to the issue

Premium Partner