Obstructions in Security-Aware Business Processes Analysis, Detection, and Handling

This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented i...

Full description

Saved in:
Bibliographic Details
Main Author: Holderer, Julius (auth)
Format: Electronic Book Chapter
Language:English
Published: Wiesbaden Springer Nature 2022
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_57935
005 20220817
003 oapen
006 m o d
007 cr|mn|---annan
008 20220817s2022 xx |||||o ||| 0|eng d
020 |a 978-3-658-38154-7 
020 |a 9783658381547 
040 |a oapen  |c oapen 
024 7 |a 10.1007/978-3-658-38154-7  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UR  |2 bicssc 
072 7 |a URD  |2 bicssc 
100 1 |a Holderer, Julius  |4 auth 
245 1 0 |a Obstructions in Security-Aware Business Processes  |b Analysis, Detection, and Handling 
260 |a Wiesbaden  |b Springer Nature  |c 2022 
300 |a 1 electronic resource (341 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. 
540 |a Creative Commons  |f by/4.0/  |2 cc  |4 http://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Computer security  |2 bicssc 
650 7 |a Privacy & data protection  |2 bicssc 
653 |a IT-Security 
653 |a Business Process Management 
653 |a Security and Privacy 
653 |a Process Security 
653 |a Compliance 
653 |a Process Automation 
653 |a Process Modeling 
653 |a Petri Net 
653 |a Process Mining 
653 |a Data Mining 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/48bd9e8b-5d01-4eaa-b3bc-51e8d806fa83/978-3-658-38154-7.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/57935  |7 0  |z OAPEN Library: description of the publication