Security and Privacy in Business Processes: A Posteriori Analysis Techniques

Security and Privacy in Business Processes: A Posteriori Analysis Techniques

Abstract

In this paper, we motivate the need to perform a posteriori analyzes for process-related security properties. In particular, we first discuss the relation of security engineering and a-posteriori techniques. Subsequently, we give an overview of different a-posteriori techniques for analyzing organizational structures and access control policies. Finally, we provide a discussion on application scenarios for different a-posteriori techniques.

Grafik Top
Authors
  • Strembeck, Mark
  • Rinderle-Ma, Stefanie
Grafik Top
Projects
Grafik Top
Shortfacts
Category
Journal Paper
Divisions
Workflow Systems and Technology
Journal or Publication Title
it - Information Technology
ISSN
2196-7032
Page Range
pp. 247-254
Date
December 2013
Export
Grafik Top