Security Requirements of E-Business Processes

نویسندگان

  • Konstantin Knorr
  • Susanne Röhrig
چکیده

$EVWUDFW: This paper presents an open framework for the analysis of security requirements of business processes in electronic commerce. The most important dimensions of the framework are security objectives (confidentiality, integrity, availability, accountability), the phases of and the places/parties involved in the process. The approach is of open nature so that it can be adapted to the heterogeneous needs of different application scenarios. The discussion of business processes within a virtual shopping mall illustrates the capacity and potential of the framework

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SREBP: Security Requirement Elicitation from Business Processes

In today's fast and dynamic environment, business processes play a crucial role for enterprises to gain competitiveness. The traditional approaches in business process domain tend to focus on business processes execution and their improvement. At the same time business process modelling maturity towards expressing the enterprise's organisational perspective (business values and stake-holders in...

متن کامل

Goal-Equivalent Secure Business Process Re-engineering for E-Health

The introduction of ITs in e-Health often requires to re-engineer the business processes used to deliver care. Obviously the new and re-engineered processes are observationally different and thus we cannot use existing modelbased techniques to argue that they are somehow “equivalent”. In this paper we propose a notion of equivalence over secure business processes based on the notion of goal-equ...

متن کامل

A Method for Eliciting Security Requirements from the Business Process Models

In recent years, the business process modelling is matured towards expressing enterprise’s organisational behaviour (i.e., business values and stakeholder interests). This shows potential to perform early security analysis to capture enterprise security needs. Traditionally, security in business processes is addressed either by representing security concepts graphically or by enforcing these se...

متن کامل

A Phase Model for E-Commerce Business Models and its Application to Security Assessment

New e-commerce business models attempt to exploit information technology to overcome the limitations of traditional business models and to lower costs by improving the efficiency of business processes. A basic requirement for their success is security mechanisms against theft or other fraud. The overall security assessment of business models is complicated, however, since the simple customer-ve...

متن کامل

Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS

Security mechanisms are substantial to an e-business environment. While many security mechanisms have been developed to secure e-business processes (EBP) and networks, little attention is given to actual process of a systematic decision making. In most cases strongest security level available is selected. In many cases there are low risks and threats associated with the processes and the use of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001