Obtaining secure business process models from an enterprise architecture considering security requirements.
Luis San MartínAlfonso RodríguezAngélica CaroIgnacio VelásquezPublished in: Bus. Process. Manag. J. (2022)
Keyphrases
- security requirements
- business process models
- reference models
- enterprise architecture
- business process management
- business processes
- business process
- security analysis
- covert channel
- smart card
- security mechanisms
- security model
- information security
- security properties
- process model
- access control
- security patterns
- security policies
- control flow
- project management
- software architecture
- service oriented
- business rules
- conceptual model
- web services
- decision making
- database
- anomaly detection