M. Chergui, S. Benslimane
{"title":"面向网络安全需求可视化的BPMN安全扩展","authors":"M. Chergui, S. Benslimane","doi":"10.4018/ijtd.2020040101","DOIUrl":null,"url":null,"abstract":"Businessprocessmodelingnotation(BPMN)isawidelyusedbusinessmodelprocess.Theimportance ofsecurityisapparent,buttraditionally,itisconsideredafterthebusinessprocessesdefinition.Thereis aneedforintegratedtoolsandamethodologythatallowsforspecifyingandenforcingcomplianceand securityrequirementsforbusinessprocess-drivenenterprisesystems.Therefore,itisveryimportant tocapturethesecurityrequirementsatconceptualstageinordertoidentifythesecurityneeds.BPMN islackingtheabilitytomodelandpresentsecurityconcepts.Thiswillincreasethevulnerabilityof thesystemandmakethefuturedevelopmentofsecurityforthesystemmoredifficult.Thisarticle proposes a novel extension to BPMN notation based on cyber security ontologies. The authors incorporatevisualconstructsformodelingsecurityrequirements.Inordertoprovideacommonly usableextension,theseenhancementswereimplementedasBPMNmetamodelextension.Theauthors illustratecapabilitiesandbenefitsofextensionwithareal-lifeexample. KEywoRDS BPMN Extension, Business Process, Modeling, Security Requirements","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Towards a BPMN Security Extension for the Visualization of Cyber Security Requirements\",\"authors\":\"M. Chergui, S. Benslimane\",\"doi\":\"10.4018/ijtd.2020040101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Businessprocessmodelingnotation(BPMN)isawidelyusedbusinessmodelprocess.Theimportance ofsecurityisapparent,buttraditionally,itisconsideredafterthebusinessprocessesdefinition.Thereis aneedforintegratedtoolsandamethodologythatallowsforspecifyingandenforcingcomplianceand securityrequirementsforbusinessprocess-drivenenterprisesystems.Therefore,itisveryimportant tocapturethesecurityrequirementsatconceptualstageinordertoidentifythesecurityneeds.BPMN islackingtheabilitytomodelandpresentsecurityconcepts.Thiswillincreasethevulnerabilityof thesystemandmakethefuturedevelopmentofsecurityforthesystemmoredifficult.Thisarticle proposes a novel extension to BPMN notation based on cyber security ontologies. The authors incorporatevisualconstructsformodelingsecurityrequirements.Inordertoprovideacommonly usableextension,theseenhancementswereimplementedasBPMNmetamodelextension.Theauthors illustratecapabilitiesandbenefitsofextensionwithareal-lifeexample. KEywoRDS BPMN Extension, Business Process, Modeling, Security Requirements\",\"PeriodicalId\":208567,\"journal\":{\"name\":\"Int. J. Technol. Diffusion\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Technol. Diffusion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijtd.2020040101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Technol. Diffusion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijtd.2020040101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Towards a BPMN Security Extension for the Visualization of Cyber Security Requirements
Businessprocessmodelingnotation(BPMN)isawidelyusedbusinessmodelprocess.Theimportance ofsecurityisapparent,buttraditionally,itisconsideredafterthebusinessprocessesdefinition.Thereis aneedforintegratedtoolsandamethodologythatallowsforspecifyingandenforcingcomplianceand securityrequirementsforbusinessprocess-drivenenterprisesystems.Therefore,itisveryimportant tocapturethesecurityrequirementsatconceptualstageinordertoidentifythesecurityneeds.BPMN islackingtheabilitytomodelandpresentsecurityconcepts.Thiswillincreasethevulnerabilityof thesystemandmakethefuturedevelopmentofsecurityforthesystemmoredifficult.Thisarticle proposes a novel extension to BPMN notation based on cyber security ontologies. The authors incorporatevisualconstructsformodelingsecurityrequirements.Inordertoprovideacommonly usableextension,theseenhancementswereimplementedasBPMNmetamodelextension.Theauthors illustratecapabilitiesandbenefitsofextensionwithareal-lifeexample. KEywoRDS BPMN Extension, Business Process, Modeling, Security Requirements