Secure Business Processes Optimization System
نویسندگان
چکیده
In this article are described security-related aspects implemented on the first stages of a project which has as the main target retaining the experience acquired by the experts in a business area of an enterprise, to later on train junior employees and help in decision making processes. To create this knowledge base, the designed system, based on business rules and information provided by the experts, can train and help the new employees to learn the experience previously acquired by the experts. It is critical to keep this information out of reach from unauthorized personnel, due to the high economic cost an intrusion and access to this information could suppose.
منابع مشابه
Designing Secure Business Processes Through Secure Activity Resource Coordination (SARC)
Business processes enable organizations to achieve business goals. Organizations require that their business processes exchange information in a secure environment. Access control mechanisms must be incorporated into the analysis, modeling, and design of business processes to prevent unauthorized access to information resources, to provide non-repudiation mechanisms, and to allow for segregatio...
متن کاملGoal-Equivalent Secure Business Process Re-engineering for E-Health
The introduction of ITs in e-Health often requires to re-engineer the business processes used to deliver care. Obviously the new and re-engineered processes are observationally different and thus we cannot use existing modelbased techniques to argue that they are somehow “equivalent”. In this paper we propose a notion of equivalence over secure business processes based on the notion of goal-equ...
متن کاملTowards Definition of Secure Business Processes
Business process modelling is one of the major aspects in the modern system development. Recently business process model and notation (BPMN) has become a standard technique to support this activity. Although BPMN is a good approach to understand business processes, there is a limited work to understand how it could deal with business security and security risk management. This is a problem, sin...
متن کاملTitle of the Paper
⎯ Business-to-Business and Business-to-Customer transactions in Internet require secure communication, especially for web applications. The Secure Socket Layer (SSL) protocol is one of the most viable solutions to provide the required level of confidentiality, message integrity and endpoint authentication. The two main alternatives for providing SSL security are the endto-end and the accelerate...
متن کاملCycle Time Optimization of Processes Using an Entropy-Based Learning for Task Allocation
Cycle time optimization could be one of the great challenges in business process management. Although there is much research on this subject, task similarities have been paid little attention. In this paper, a new approach is proposed to optimize cycle time by minimizing entropy of work lists in resource allocation while keeping workloads balanced. The idea of the entropy of work lists comes fr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004