Obstructions in Security-Aware Business Processes
Analysis, Detection, and Handling
dc.contributor.author | Holderer, Julius | |
dc.date.accessioned | 2022-08-17T20:14:39Z | |
dc.date.available | 2022-08-17T20:14:39Z | |
dc.date.issued | 2022 | |
dc.identifier | ONIX_20220817_9783658381547_28 | |
dc.identifier.uri | https://library.oapen.org/handle/20.500.12657/57935 | |
dc.description.abstract | This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. | |
dc.language | English | |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection | en_US |
dc.subject.other | IT-Security | |
dc.subject.other | Business Process Management | |
dc.subject.other | Security and Privacy | |
dc.subject.other | Process Security | |
dc.subject.other | Compliance | |
dc.subject.other | Process Automation | |
dc.subject.other | Process Modeling | |
dc.subject.other | Petri Net | |
dc.subject.other | Process Mining | |
dc.subject.other | Data Mining | |
dc.title | Obstructions in Security-Aware Business Processes | |
dc.title.alternative | Analysis, Detection, and Handling | |
dc.type | book | |
oapen.identifier.doi | 10.1007/978-3-658-38154-7 | |
oapen.relation.isPublishedBy | 6c6992af-b843-4f46-859c-f6e9998e40d5 | |
oapen.relation.isFundedBy | 0d7cb655-c6c7-40c5-b2e3-3e56349035b3 | |
oapen.relation.isFundedBy | Deutsche Forschungsgemeinschaft (DFG) | |
oapen.relation.isbn | 9783658381547 | |
oapen.collection | DFG Open Access Publication Funding | |
oapen.imprint | Springer Vieweg | |
oapen.pages | 341 | |
oapen.place.publication | Wiesbaden | |
oapen.grant.number | [...] |