Idea to derive security policies from collaborative business processes.
Ji HuPublished in: EDOCW (2009)
Keyphrases
- business processes
- security policies
- business process
- access control
- security management
- distributed systems
- web services
- workflow systems
- network security
- security requirements
- business process models
- competitive advantage
- data centric
- business environment
- process model
- business process management
- ubiquitous computing environments
- workflow management
- event logs
- workflow management systems
- inter organizational
- access control policies
- process mining
- business process modeling
- service oriented architecture
- information sharing
- database applications
- data processing
- decision makers
- business partners
- case study