{"title":"On the security of business processes: classification of approaches, comparison, and research directions","authors":"Abdmeziem Farah, Boukhedouma Saida, Oussalah Mourad","doi":"10.1109/icnas53565.2021.9628908","DOIUrl":null,"url":null,"abstract":"Business processes are at the heart of companies and evolve constantly to cope with the business needs. Considering the speed at which these changes occur, securing companies’ business processes has become much more critical. Indeed, business processes are becoming more complex and rely on today’s new technologies like the Cloud Computing that cause many security concerns. In this paper, we overview the security with its three goals namely confidentiality, integrity and availability of information systems, focusing on the business process layer. We consider the main business process dimensions (aspects), namely, the informational, the organizational and the logical (behavioural) dimensions. Then, we review and provide a comparison of distinct published security approaches that we have categorised into six main classes. Finally, based on our comparative study, we identify open questions and research directions in the field.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Advanced Systems (ICNAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icnas53565.2021.9628908","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Business processes are at the heart of companies and evolve constantly to cope with the business needs. Considering the speed at which these changes occur, securing companies’ business processes has become much more critical. Indeed, business processes are becoming more complex and rely on today’s new technologies like the Cloud Computing that cause many security concerns. In this paper, we overview the security with its three goals namely confidentiality, integrity and availability of information systems, focusing on the business process layer. We consider the main business process dimensions (aspects), namely, the informational, the organizational and the logical (behavioural) dimensions. Then, we review and provide a comparison of distinct published security approaches that we have categorised into six main classes. Finally, based on our comparative study, we identify open questions and research directions in the field.