top of page

Obstructions in Security-Aware Business Processes

Inside this Book

If you make use of this material, you may credit the authors as follows:

Holderer Julius, "Obstructions in Security-Aware Business Processes", Springer Nature, 2022, DOI: 10.1007/978-3-658-38154-7, License: http://creativecommons.org/licenses/by/4.0/

This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software.

Keywords

It-security, Business Process Management, Security And Privacy, Process Security, Compliance, Process Automation, Process Modeling, Petri Net, Process Mining, Data Mining

Rights | License

Except where otherwise noted, this item has been published under the following license:

Takedown policy

If you believe that this publication infringes copyright, please contact us at info@jecasa-ltd.com and provide relevant details so that we can investigate your claim.

bottom of page