Security policy monitoring of BPMN-based service compositions.
Muhammad AsimArtsiom YautsiukhinAchim D. BruckerThar BakerQi ShiBrett LempereurPublished in: J. Softw. Evol. Process. (2018)
Keyphrases
- security policies
- service compositions
- access control
- business processes
- security management
- distributed systems
- network security
- business process
- access control systems
- security requirements
- business process models
- web services
- security concerns
- network management
- process model
- access control policies
- model driven
- ubiquitous computing environments
- service providers
- event logs
- security architecture
- business process modeling
- security measures
- fine grained
- access control mechanism
- relational databases
- data analysis
- unauthorized access
- information systems