Skip to Main Content (Press Enter)

Logo UNIBG
  • ×
  • Home
  • Corsi
  • Insegnamenti
  • Persone
  • Pubblicazioni
  • Strutture
  • Terza Missione
  • Attività
  • Competenze

UNI-FIND
Logo UNIBG

|

UNI-FIND

unibg.it
  • ×
  • Home
  • Corsi
  • Insegnamenti
  • Persone
  • Pubblicazioni
  • Strutture
  • Terza Missione
  • Attività
  • Competenze
  1. Pubblicazioni

From security-by-design to the identification of security-critical deviations in process executions

Contributo in Atti di convegno
Data di Pubblicazione:
2018
Citazione:
(2018). From security-by-design to the identification of security-critical deviations in process executions . Retrieved from https://hdl.handle.net/10446/324066
Abstract:
Security-by-design is an emerging paradigm that aims to deal with security concerns from the early phases of the system development. Although this paradigm can provide theoretical guarantees that the designed system complies with the defined processes and security policies, in many application domains users are allowed to deviate from them to face unpredictable situations and emergencies. Some deviations can be harmless and, in some cases, necessary to ensure business continuity, whereas other deviations might threat central aspects of the system, such as its security. In this paper, we propose a tool supported method for the identification of security-critical deviations in process executions using compliance checking analysis. We implemented the approach as part of the STS-Tool and evaluated it using a real loan management process of a Dutch financial institute.
Tipologia CRIS:
1.4.01 Contributi in atti di convegno - Conference presentations
Elenco autori:
Salnitri, Mattia; Alizadeh, M.; Giovanella, D.; Zannone, N.; Giorgini, P.
Autori di Ateneo:
SALNITRI Mattia
Link alla scheda completa:
https://aisberg.unibg.it/handle/10446/324066
Titolo del libro:
Information Systems in the Big Data Era. CAiSE Forum 2018, Proceedings
Pubblicato in:
LECTURE NOTES IN BUSINESS INFORMATION PROCESSING
Series
  • Ricerca

Ricerca

Settori (2)


PE6_5 - Security, privacy, cryptology, quantum cryptography - (2024)

Settore IINF-05/A - Sistemi di elaborazione delle informazioni
  • Utilizzo dei cookie

Realizzato con VIVO | Designed by Cineca | 26.5.0.0