Obstructions in Security-Aware Business Processes Analysis, Detection, and Handling
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented i...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Wiesbaden
Springer Nature
2022
|
Subjects: | |
Online Access: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_57935 | ||
005 | 20220817 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20220817s2022 xx |||||o ||| 0|eng d | ||
020 | |a 978-3-658-38154-7 | ||
020 | |a 9783658381547 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.1007/978-3-658-38154-7 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a URD |2 bicssc | |
100 | 1 | |a Holderer, Julius |4 auth | |
245 | 1 | 0 | |a Obstructions in Security-Aware Business Processes |b Analysis, Detection, and Handling |
260 | |a Wiesbaden |b Springer Nature |c 2022 | ||
300 | |a 1 electronic resource (341 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. | ||
540 | |a Creative Commons |f by/4.0/ |2 cc |4 http://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Computer security |2 bicssc | |
650 | 7 | |a Privacy & data protection |2 bicssc | |
653 | |a IT-Security | ||
653 | |a Business Process Management | ||
653 | |a Security and Privacy | ||
653 | |a Process Security | ||
653 | |a Compliance | ||
653 | |a Process Automation | ||
653 | |a Process Modeling | ||
653 | |a Petri Net | ||
653 | |a Process Mining | ||
653 | |a Data Mining | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/48bd9e8b-5d01-4eaa-b3bc-51e8d806fa83/978-3-658-38154-7.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/handle/20.500.12657/57935 |7 0 |z OAPEN Library: description of the publication |