Mostrar el registro sencillo del ítem

Artículo

dc.creatorEstañol, Montserrates
dc.creatorVarela Vaca, Ángel Jesúses
dc.creatorGómez López, María Teresaes
dc.creatorTeniente, Ernestes
dc.creatorMartínez Gasca, Rafaeles
dc.date.accessioned2022-10-26T10:17:18Z
dc.date.available2022-10-26T10:17:18Z
dc.date.issued2022
dc.identifier.citationEstañol, M., Varela Vaca, Á.J., Gómez López, M.T., Teniente, E. y Martínez Gasca, R. (2022). Reasoning on the usage control security policies over data artifact business process models. Computer Science and Information Systems, 19 (2), 547-572. https://doi.org/10.2298/CSIS210217061E.
dc.identifier.issn2683-3867es
dc.identifier.urihttps://hdl.handle.net/11441/138354
dc.description.abstractThe inclusion of security aspects in organizations is a crucial aspect to ensure compliance with both internal and external regulations. Business process models are a well-known mechanism to describe and automate the activities of the organizations, which should include security policies to ensure the correct performance of the daily activities. Frequently, these security policies involve complex data which cannot be represented using the standard Business Process Model Notation (BPMN). In this paper, we propose the enrichment of the BPMN with a UML class diagram to describe the data model, that is also combined with security policies defined using the UCONABC framework annotated within the business process model. The integration of the business process model, the data model, and the security policies provides a context where more complex reasoning can be applied about the satisfiability of the security policies in accordance with the business process and data models. To do so, we transform the original models, including security policies, into the BAUML framework (an artifact-centric approach to business process modelling). Once this is done, it is possible to ensure that there are no inherent errors in the model (verification) and that it fulfils the business requirements (validation), thus ensuring that the business process and the security policies are compatible and that they are aligned with the business security requirements.es
dc.description.sponsorshipMinisterio de Ciencia e Innovación PID2020-112540RB-C44es
dc.description.sponsorshipMinisterio de Ciencia e Innovación TIN2017-87610-Res
dc.description.sponsorshipGeneralitat de Catalunya 2017-SGR-1749es
dc.description.sponsorshipJunta de Andalucía P20-01224 (COPERNICA)es
dc.description.sponsorshipJunta de Andalucía METAMORFOSIS (US-1381375)es
dc.formatapplication/pdfes
dc.format.extent25es
dc.language.isoenges
dc.publisherComSIS Consortiumes
dc.relation.ispartofComputer Science and Information Systems, 19 (2), 547-572.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectBusiness processeses
dc.subjectSecurity policyes
dc.subjectUsage control modeles
dc.subjectData artifactes
dc.subjectReasoninges
dc.titleReasoning on the usage control security policies over data artifact business process modelses
dc.typeinfo:eu-repo/semantics/articlees
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/submittedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticoses
dc.relation.projectIDPID2020-112540RB-C44es
dc.relation.projectIDTIN2017-87610-Res
dc.relation.projectID2017-SGR-1749es
dc.relation.projectIDP20-01224 (COPERNICA)es
dc.relation.projectIDMETAMORFOSIS (US-1381375)es
dc.relation.publisherversionhttp://www.doiserbia.nb.rs/Article.aspx?ID=1820-02142100061E#.Y1kBknZBybges
dc.identifier.doi10.2298/CSIS210217061Ees
dc.contributor.groupUniversidad de Sevilla. TIC-258: Data-centric Computing Research Hubes
dc.journaltitleComputer Science and Information Systemses
dc.publication.volumen19es
dc.publication.issue2es
dc.publication.initialPage547es
dc.publication.endPage572es
dc.contributor.funderMinisterio de Ciencia e Innovación (MICIN). Españaes
dc.contributor.funderGeneralitat de Catalunyaes
dc.contributor.funderJunta de Andalucíaes

FicherosTamañoFormatoVerDescripción
Reasoning on the usage control ...983.8KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional