Ponencia
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
Autor/es | Varela Vaca, Ángel Jesús
![]() ![]() ![]() ![]() ![]() ![]() ![]() Warschofsky, Robert Martínez Gasca, Rafael ![]() ![]() ![]() ![]() ![]() ![]() ![]() Pozo Hidalgo, Sergio Meinel, Christoph |
Departamento | Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos |
Fecha de publicación | 2012 |
Fecha de depósito | 2022-11-15 |
Publicado en |
|
ISBN/ISSN | 978-3-642-33017-9 2194-5357 |
Resumen | Risk management has become an essential mechanism for
business and security analysts, since it enable the identification, evalu ation and treatment of any threats, vulnerabilities, and risks to which
organizations maybe ... Risk management has become an essential mechanism for business and security analysts, since it enable the identification, evalu ation and treatment of any threats, vulnerabilities, and risks to which organizations maybe be exposed. In this paper, we discuss the need to provide a standard representation of security countermeasures in order to automate the selection of countermeasures for business processes. The main contribution lies in the specification of security pattern as standard representation for countermeasures. Classical security pattern structure is extended to incorporate new features that enable the automatic selec tion of security patterns. Furthermore, a prototype has been developed which support the specification of security patterns in a graphical way. |
Agencias financiadoras | Junta de Andalucía Ministerio de Educación y Ciencia (MEC). España |
Identificador del proyecto | P08-TIC-04095
![]() TIN2009-13714 ![]() |
Cita | Varela Vaca, Á.J., Warschofsky, R., Martínez Gasca, R., Pozo Hidalgo, S. y Meinel, C. (2012). A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes. En International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions (13-23), Ostrava, Czech Republic: Springer. |
Ficheros | Tamaño | Formato | Ver | Descripción |
---|---|---|---|---|
A security pattern-driven approach ... | 996.8Kb | ![]() | Ver/ | |