{"title":"从协作业务流程派生安全策略的想法","authors":"Ji Hu","doi":"10.1109/EDOCW.2009.5331987","DOIUrl":null,"url":null,"abstract":"Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing security requirements in collaborative environments is error-prone, effort inefficient, and hard to be verified. This paper introduces our ongoing research effort for developing algorithms and methods to derive security policies from formally defined business process models. The derived policies serve as templates which can be later on complemented with concrete business entity data and finally turned into deployable policies.","PeriodicalId":226791,"journal":{"name":"2009 13th Enterprise Distributed Object Computing Conference Workshops","volume":"158 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Idea to derive security policies from collaborative business processes\",\"authors\":\"Ji Hu\",\"doi\":\"10.1109/EDOCW.2009.5331987\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing security requirements in collaborative environments is error-prone, effort inefficient, and hard to be verified. This paper introduces our ongoing research effort for developing algorithms and methods to derive security policies from formally defined business process models. The derived policies serve as templates which can be later on complemented with concrete business entity data and finally turned into deployable policies.\",\"PeriodicalId\":226791,\"journal\":{\"name\":\"2009 13th Enterprise Distributed Object Computing Conference Workshops\",\"volume\":\"158 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 13th Enterprise Distributed Object Computing Conference Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDOCW.2009.5331987\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 13th Enterprise Distributed Object Computing Conference Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDOCW.2009.5331987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Idea to derive security policies from collaborative business processes
Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing security requirements in collaborative environments is error-prone, effort inefficient, and hard to be verified. This paper introduces our ongoing research effort for developing algorithms and methods to derive security policies from formally defined business process models. The derived policies serve as templates which can be later on complemented with concrete business entity data and finally turned into deployable policies.