Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN:
Online ISSN: 2583-5009


  About DSPAI
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy

 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Digital Signal Processing and Artificial Intelligence for Automatic Learning
 

 

Security Processes as Machines: A Case Study
Sabah Al-Fedaghi, Manal Alsharah
Computer Engineering Department Kuwait University Kuwait., IT-Services, Corporate Information Technology Group Kuwait Oil Company Kuwait
Abstract: Business processes (called machines in this paper) are indispensable instruments for the realization of business activities of production and services. Business security processes (machines) are a type of machines whose role involves decreasing risks, responding to incidents, limiting exposure to liability and increase financial, physical, and personal risk values. Security machines are one of the most important nonfunctional business processes due to the possible effect of their failures for organizations in terms of finances, reputation and legal compliance. This paper focuses on capturing security as machines in a diagrammatic form either in the requirements phase of software development or as a necessary tool for documentation and communication in an ongoing system. A number of modeled security processes as machines are developed which can be integrated into business process streams in order to monitor different types of security aspects (e.g., confidentiality, integrity, availability). The paper purpose is to experiment with such a newly proposed machine-oriented approach to the notion of security process and develop case studies in actual business environments. The results points to the viability of the modeling methodology.
Keywords: Conceptual Modeling, Diagrammatic Description, System Behavior, Process Control Security Processes as Machines: A Case Study
DOI:https://doi.org/10.6025/dspaial/2022/1/2/49-61
Full_Text   PDF 2.98 MB   Download:   95  times
References:

[1] Weske, M. Business Process Management: Concepts, Languages, Architectures.
[2] Neubauer, T., Klemen, M. & Biffl, S. (2006) Secure business process management: A roadmap. In: 1st International Conference on Availability, Reliability and Security (ARES 2006). IEEE Publications. Springer: Heidelberg (2010), p. 8.
[3] Mitasiunas, A., Novickis, L. & Kalpokas, R. (2014) Security process capability model based on ISO/IEC 15504 conformant enterprise SPICE. Applied Computer Systems, 15, Issue 1 (Jul 2014), 36–41
[4] Deleuze, G. & Guattari, F. (1983) Anti-Oedipus, translated from the French by R. Hurley. Marketer Seem, and Helen R. University of Minnesota Press: Lane (Originally 1972).
[5] Al-Fedaghi, S. & Alduwaisan, Y. (2018) Process modeling for analysis and control: A case study of IT services. International Journal of Control and Automation, 11, pp, 25–42.
[6] Al Fedaghi, S. & Abdullah, A. (2017) Flow-based systems modeling: Application in airport system description. International Journal of Industrial and Systems Engineering, 25, 318–334 [DOI: 10.1504/IJISE.2017.10002580].
[7] Al-Fedaghi, S. (2017) Context-aware software systems: Toward a diagrammatic modeling foundation. J. Theoretical Appl. Inform. Technol., 95.
[8] Al-Fedaghi, S. & Alahmad, H. Orientation in conceptual modeling frameworks 3rd IEEE International Conference on Big Data Intelligence and Computing, Orlando, USA, 6–10 November, 2017 [DOI: 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.209].
[9] Al-Fedaghi, S. & Alahmad, H. (2018) Integrated modeling methodologies and languages. Academic Medicine 12th International Conference on Ubiquitous Information Management and Communication, Langkawi, Malaysia, 5–7 January, 2018.
[10] Al-Fedaghi, S. Activity recognition and sensor positioning IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2016), 9–12 October, Budapest, Hungary.
[11] Al-Fedaghi, S. Schematizing proofs based on flow of truth values in logic IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), 13–16 October, Manchester, UK [DOI: 10.1109/SMC.2013.40].
[12] Aagesen, G. & Krogstie, J. (2010), pp Analysis and design of business processes using BPMN. In: Handbook on Business Process Management 1. International Handbooks on Information Systems (edited by J. vom Brocke & M. Rosemann). Springer- Verlag: Berlin.
[13] von Rosing, M., Foldage, U., Hove, M., von Scheel, J. & Bøgebjerg, A.F. (2015). Working with the Business Process Management (BPM) Life Cycle, the Complete Business Process Handbook, Vol. 1. Elsevier: Amsterdam [DOI: 10.1016/B978-0-12- 799959-3.00014-8].
[14] Dumas, M., La Rosa, M., Mendling, J. & Reijers, H. (2018). Fundamentals of Business Process Management. Springer-Verlag: Berlin, Heidelberg [DOI: 10.1007/978-3-662-56509-4].
[15] Lampathaki, F., Koussouris, S. & Psarras, J. (2013) Business process modeling: Business process reengineering. Location.
[16] Object Management Group. About the Unified Modeling Language Specification, version 2.5 (2015). www.omg.org/spec/ UML/About-UML/.
[17] Corradini, F., Fornari, F., Polini, A., Re, B., Tiezzi, F. & Vandin, A. (2017) BProVe: A formal verification framework for business process models. In: Proceedings of the 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE Publications, pp. 217–228.
[18] Scheer, I.D.S. & ARIS (Architecture of Integrated Information Systems) Location. Springer: Berlin (1992).
[19] Ko, R.K.L., Lee, S.S.G. & Lee, E.W. (2009) Business process management (BPM) standards: A survey. Business Process Management Journal, 15, pp, 744–791 [DOI: 10.1108/14637150910987937].
[20] Havey, M. (2006) Keeping BPM simple for business users: Power users beware. BPTrends. mchavey.blogspot.com/2016/04/ the-mike-havey-collection.html#. January 2006!/2016/04/the-mike-havey-collection.html.
[21] Argyropoulos, N., Mouratidis, H. & Fish, A. (2017) Supporting secure business process design via security process patterns. In: BPMDS/EMMSAD 2017, LNBIP, Vol. 287 (edited by I. Reinhartz-Berger), pp. 19–33.
[22] Specification of Business Process Modeling Notation version 2.0 (BPMN 2.0) [Online] (2017). www.omg.org/spec/BPMN/ 2.0/PDF.
[23] Saleem, M.Q., Jaafar, J. & Hassan, M.F. (2012) Security modelling along business process model of SOA systems using modified “”UML-SOA-Sec” International Conference on Computer & Information Science (ICCIS).
[24] Rodríguez, A., Guzmán, I.Gd, Fernández-Medina, E. & Piattini, M. (2010) Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach. Information and Software Technology, 52, 945–971.
[25] Morse, R.E., Nadkarni, P., Schoenfeld, D.A. & Finkelstein, D.M. (2011). www.biomedcentral.com/1472-6947/11/70 Web-browser encryption of personal health information. BMC Medical Informatics and Decision Making, 11, 70.
[26] CGI Group, Inc. (2004). Public Key Encryption and Digital Signature: How Do They Work? [White paper]. https:// www.google.com/url?sa= t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwiGgOiR1qjaAhWGtBQKHX5CCvY QFggkMAA&url=https%3A%2F%2Fwww.cgi.com%2Ffiles%2Fwhite-papers%2Fcgi_whpr_35_pki_e.pdf&usg=AOvVa w1Xscgpmo3SSPLFg30LoE4G.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info