Show simple item record

dc.contributor.authorHolderer, Julius
dc.date.accessioned2022-08-18T04:02:31Z
dc.date.available2022-08-18T04:02:31Z
dc.date.issued2022
dc.date.submitted2022-08-17T20:14:39Z
dc.identifierONIX_20220817_9783658381547_28
dc.identifierONIX_20220817_9783658381547_28
dc.identifierOCN: 1338233014
dc.identifierhttps://library.oapen.org/handle/20.500.12657/57935
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/91298
dc.description.abstractThis Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software.
dc.languageEnglish
dc.rightsopen access
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protectionen_US
dc.subject.otherIT-Security
dc.subject.otherBusiness Process Management
dc.subject.otherSecurity and Privacy
dc.subject.otherProcess Security
dc.subject.otherCompliance
dc.subject.otherProcess Automation
dc.subject.otherProcess Modeling
dc.subject.otherPetri Net
dc.subject.otherProcess Mining
dc.subject.otherData Mining
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UR Computer security
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection
dc.titleObstructions in Security-Aware Business Processes
dc.title.alternativeAnalysis, Detection, and Handling
dc.typebook
oapen.identifier.doi10.1007/978-3-658-38154-7
oapen.relation.isPublishedBy9fa3421d-f917-4153-b9ab-fc337c396b5a
oapen.relation.isFundedBy0d7cb655-c6c7-40c5-b2e3-3e56349035b3
oapen.relation.isbn9783658381547
oapen.collectionDFG - German Research Foundation
oapen.imprintSpringer Vieweg
oapen.pages341
oapen.place.publicationWiesbaden
oapen.grant.number[...]
dc.relationisFundedBy0d7cb655-c6c7-40c5-b2e3-3e56349035b3
dc.relationisFundedByDeutsche Forschungsgemeinschaft (DFG)


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

open access
Except where otherwise noted, this item's license is described as open access