This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detecti...
Abstract. Security-sensitive business processes are business processes that must comply with securit...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance...
Detecting conflicts between security and data-minimization requirements is a challenging task. Since...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
Access control is fundamental in protecting information systems but it can also pose an obstacle to ...
Security-sensitive business processes are business processes that must comply with security requirem...
International audienceBusiness processes are at the heart of companies and evolve constantly to cope...
Part 2: Access Control and AuthorizationInternational audienceTo support the re-use of business proc...
Abstract Economic globalization leads to complex decentralized company structures calling for the ex...
Research in enterprise system security has largely focused on the development of theoretical models ...
Abstract. Security-sensitive business processes are business processes that must comply with securit...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance...
Detecting conflicts between security and data-minimization requirements is a challenging task. Since...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
In this PhD thesis, new echniques based on Formal Methods are presented for security verification of ...
Access control is fundamental in protecting information systems but it can also pose an obstacle to ...
Security-sensitive business processes are business processes that must comply with security requirem...
International audienceBusiness processes are at the heart of companies and evolve constantly to cope...
Part 2: Access Control and AuthorizationInternational audienceTo support the re-use of business proc...
Abstract Economic globalization leads to complex decentralized company structures calling for the ex...
Research in enterprise system security has largely focused on the development of theoretical models ...
Abstract. Security-sensitive business processes are business processes that must comply with securit...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...