Skip to main content

2018 | OriginalPaper | Buchkapitel

A Valid BPMN Extension for Supporting Security Requirements Based on Cyber Security Ontology

verfasst von : Mohamed El Amine Chergui, Sidi Mohamed Benslimane

Erschienen in: Model and Data Engineering

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Business Process Model and Notation (BPMN) is the de facto standard for business process modeling. One of the most important aspect of business process models is security. Since most business processes revolve around the exchange of information, the security of such information assets becomes a critical factor for the success of the overall business process. Therefore, it is very important to capture the security requirements at conceptual level in order to identify the security needs in the first place. There is a need for an integrated tools and methodology that allows for specifying and enforcing compliance and security requirements for business process-driven enterprise systems. Furthermore, BPMN do not support the specification of security requirements along the business process modelling. This will increase the vulnerability of the system and make the future development of security for the system more difficult. In this paper, we extend the BPMN language to explicitly support the specification of security requirements derived from cyber security ontology. We incorporate visual constructs for modeling security requirements. In order to provide a commonly usable extension, these enhancements were implemented as a valid BPMN extension. An application example from the healthcare domain is used to demonstrate our approach. The experimentation denotes that the authors’ approach achieves better results in terms comprehensive understanding of incorporated security requirements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 41–48 (2009) Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 41–48 (2009)
Zurück zum Zitat Rodriguez, A., Fernandez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. E90–D(4), 745–752 (2007)CrossRef Rodriguez, A., Fernandez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. E90–D(4), 745–752 (2007)CrossRef
Zurück zum Zitat Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT 2012, pp. 123–126 (2012) Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT 2012, pp. 123–126 (2012)
Zurück zum Zitat Qaiser, S.M., Jaafar, J.B., Hassan, M.F.: A domain-specific language for modelling security objectives in a business process models of SOA applications. Int. J. Adv. Inf. Sci. Serv. Sci. 4(1), 353–362 (2012) Qaiser, S.M., Jaafar, J.B., Hassan, M.F.: A domain-specific language for modelling security objectives in a business process models of SOA applications. Int. J. Adv. Inf. Sci. Serv. Sci. 4(1), 353–362 (2012)
Zurück zum Zitat Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: 2013 International Conference on Availability, Reliability and Security, pp. 546–555 (2013) Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: 2013 International Conference on Availability, Reliability and Security, pp. 546–555 (2013)
Zurück zum Zitat Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Architect. 55(4), 211–223 (2009)CrossRef Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Architect. 55(4), 211–223 (2009)CrossRef
Zurück zum Zitat Labda, W., Mehandjiev, N., Sampaio, P.: Modeling of privacy-aware business processes in BPMN to protect personal data. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing - SAC 2014, pp. 1399–1405 (2014) Labda, W., Mehandjiev, N., Sampaio, P.: Modeling of privacy-aware business processes in BPMN to protect personal data. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing - SAC 2014, pp. 1399–1405 (2014)
Zurück zum Zitat Mülle, J., Stackelberg, S.V., Böhm, K.: A security language for BPMN process models. In: Karlsruhe Reports in Informatics (2011) Mülle, J., Stackelberg, S.V., Böhm, K.: A security language for BPMN process models. In: Karlsruhe Reports in Informatics (2011)
Zurück zum Zitat Maines, C.L., Llewellyn-Jones, D., Tang, S., Zhou, B.: A cyber security ontology for BPMN-security extensions. In: The IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing, pp. 1756–1763 (2015) Maines, C.L., Llewellyn-Jones, D., Tang, S., Zhou, B.: A cyber security ontology for BPMN-security extensions. In: The IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing, pp. 1756–1763 (2015)
Zurück zum Zitat Sang, K.S., Zhou, B.: BPMN security extensions for healthcare process. In: The IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing, pp. 2340–2345 (2015) Sang, K.S., Zhou, B.: BPMN security extensions for healthcare process. In: The IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing, pp. 2340–2345 (2015)
Zurück zum Zitat Altuhhov, O., Matulevičius, R., Ahmed, N.: An extension of business process model and notation for security risk management. Int. J. Inf. Syst. Model. Des. 4(4), 93–113 (2013)CrossRef Altuhhov, O., Matulevičius, R., Ahmed, N.: An extension of business process model and notation for security risk management. Int. J. Inf. Syst. Model. Des. 4(4), 93–113 (2013)CrossRef
Zurück zum Zitat Basin, D., Burri, S.J., Karjoth, G.: Obstruction-free authorization enforcement: aligning security with business objectives. In: 2011 IEEE 24th Computer Security Foundations Symposium, pp. 99–113 (2011) Basin, D., Burri, S.J., Karjoth, G.: Obstruction-free authorization enforcement: aligning security with business objectives. In: 2011 IEEE 24th Computer Security Foundations Symposium, pp. 99–113 (2011)
Zurück zum Zitat Maines, C.L., Zhou, B., Tang, S., Shi, Q.: Adding a third dimension to BPMN as a means of representing cyber security requirements. In: 2016 9th International Conference on Developments in eSystems Engineering (DeSE), pp. 105–110 (2016) Maines, C.L., Zhou, B., Tang, S., Shi, Q.: Adding a third dimension to BPMN as a means of representing cyber security requirements. In: 2016 9th International Conference on Developments in eSystems Engineering (DeSE), pp. 105–110 (2016)
Zurück zum Zitat Argyropoulos, N., Mouratidis, H., Fish, A.: Attribute-based security verification of business process models. In: 2017 IEEE 19th Conference on Business Informatics (CBI), pp. 43–52 (2017) Argyropoulos, N., Mouratidis, H., Fish, A.: Attribute-based security verification of business process models. In: 2017 IEEE 19th Conference on Business Informatics (CBI), pp. 43–52 (2017)
Zurück zum Zitat Braun, R., Schlieter, H., Burwitz, M., Esswein, W.: BPMN4CP: design and implementation of a BPMN extension for clinical pathways. In: 2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 9–16 (2014) Braun, R., Schlieter, H., Burwitz, M., Esswein, W.: BPMN4CP: design and implementation of a BPMN extension for clinical pathways. In: 2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 9–16 (2014)
Zurück zum Zitat Leitner, M., Miller, M., Rinderle-Ma, S.: An analysis and evaluation of security aspects in the business process model and notation. In: 2013 International Conference on Availability, Reliability and Security, pp. 262–267 (2013) Leitner, M., Miller, M., Rinderle-Ma, S.: An analysis and evaluation of security aspects in the business process model and notation. In: 2013 International Conference on Availability, Reliability and Security, pp. 262–267 (2013)
Zurück zum Zitat Bodart, F., Patel, A., Sim, M., Weber, R.: Should optional properties be used in conceptual modelling? a theory and three empirical tests. Inf. Syst. Res. 12(4), 384–405 (2001)CrossRef Bodart, F., Patel, A., Sim, M., Weber, R.: Should optional properties be used in conceptual modelling? a theory and three empirical tests. Inf. Syst. Res. 12(4), 384–405 (2001)CrossRef
Zurück zum Zitat Burton-Jones, A., Wand, Y., Weber, R.: Guidelines for empirical evaluations of conceptual modeling grammars. J. Assoc. Inf. Syst. 10(6), 495–532 (2009) Burton-Jones, A., Wand, Y., Weber, R.: Guidelines for empirical evaluations of conceptual modeling grammars. J. Assoc. Inf. Syst. 10(6), 495–532 (2009)
Metadaten
Titel
A Valid BPMN Extension for Supporting Security Requirements Based on Cyber Security Ontology
verfasst von
Mohamed El Amine Chergui
Sidi Mohamed Benslimane
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00856-7_14

Premium Partner