iii Modern Information System (IS) development supports different techniques for business process modelling. Recently Business Process Model and Notation (BPMN) has become a standard that allows modellers to visualise organizational business processes. However, despite the fact that BPMN is a good approach to introduce and understand business processes, there is no opportunity to address security concerns while analysing the business needs. This is a problem, since both business processes and security concerns should be understood in parallel to support a development of the secure systems. In current thesis we introduce the extensions for BPMN 2.0 regarding security aspects. The following proposal is based on alignment of the modelling nota...
Business process management (BPM) and accompanying systems allow organizations to react faster both ...
The main contribution of this thesis is Secure*BPMN, a graphical security modelling extension for th...
Securing the organization critical information assets from sophisticated insider threats and outside...
2 Business process modelling is one of the major aspects in the modern system development. Recently ...
The participation of business experts in the elicitation and formulation of Information Assurance & ...
Abstract. The participation of business experts in the elicitation and formulation of Information As...
Part 7: System Models and Risk AssessmentInternational audienceDuring the years of prosperity, numer...
Security requirements is the fundamental component in designing and defending IT systems against cyb...
The importance of Business Process Modeling (BPM) particularly in sensitive areas combined with the ...
The modelling of healthcare process is inherently complicated due to its multi-disciplinary characte...
Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope...
Every so often papers are published presenting a new extension for modelling cyber security requirem...
Business process management (BPM) and accompanying systems aim at enabling enterprises to become ada...
Abstract—Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning th...
Abstract. In recent years, the business process modelling is matured towards expressing enterprise’s...
Business process management (BPM) and accompanying systems allow organizations to react faster both ...
The main contribution of this thesis is Secure*BPMN, a graphical security modelling extension for th...
Securing the organization critical information assets from sophisticated insider threats and outside...
2 Business process modelling is one of the major aspects in the modern system development. Recently ...
The participation of business experts in the elicitation and formulation of Information Assurance & ...
Abstract. The participation of business experts in the elicitation and formulation of Information As...
Part 7: System Models and Risk AssessmentInternational audienceDuring the years of prosperity, numer...
Security requirements is the fundamental component in designing and defending IT systems against cyb...
The importance of Business Process Modeling (BPM) particularly in sensitive areas combined with the ...
The modelling of healthcare process is inherently complicated due to its multi-disciplinary characte...
Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope...
Every so often papers are published presenting a new extension for modelling cyber security requirem...
Business process management (BPM) and accompanying systems aim at enabling enterprises to become ada...
Abstract—Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning th...
Abstract. In recent years, the business process modelling is matured towards expressing enterprise’s...
Business process management (BPM) and accompanying systems allow organizations to react faster both ...
The main contribution of this thesis is Secure*BPMN, a graphical security modelling extension for th...
Securing the organization critical information assets from sophisticated insider threats and outside...