Show simple item record

dc.contributor.authorHolderer, Julius
dc.date.accessioned2022-08-17T20:14:39Z
dc.date.available2022-08-17T20:14:39Z
dc.date.issued2022
dc.identifierONIX_20220817_9783658381547_28
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/57935
dc.description.abstractThis Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protectionen_US
dc.subject.otherIT-Security
dc.subject.otherBusiness Process Management
dc.subject.otherSecurity and Privacy
dc.subject.otherProcess Security
dc.subject.otherCompliance
dc.subject.otherProcess Automation
dc.subject.otherProcess Modeling
dc.subject.otherPetri Net
dc.subject.otherProcess Mining
dc.subject.otherData Mining
dc.titleObstructions in Security-Aware Business Processes
dc.title.alternativeAnalysis, Detection, and Handling
dc.typebook
oapen.identifier.doi10.1007/978-3-658-38154-7
oapen.relation.isPublishedBy6c6992af-b843-4f46-859c-f6e9998e40d5
oapen.relation.isFundedBy0d7cb655-c6c7-40c5-b2e3-3e56349035b3
oapen.relation.isFundedByDeutsche Forschungsgemeinschaft (DFG)
oapen.relation.isbn9783658381547
oapen.collectionDFG Open Access Publication Funding
oapen.imprintSpringer Vieweg
oapen.pages341
oapen.place.publicationWiesbaden
oapen.grant.number[...]


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record