Security and Privacy in Business Processes: A Posteriori Analysis Techniques
Abstract
In this paper, we motivate the need to perform a posteriori analyzes for process-related security properties. In particular, we first discuss the relation of security engineering and a-posteriori techniques. Subsequently, we give an overview of different a-posteriori techniques for analyzing organizational structures and access control policies. Finally, we provide a discussion on application scenarios for different a-posteriori techniques.

- Strembeck, Mark
- Rinderle-Ma, Stefanie

Shortfacts
Category |
Journal Paper |
Divisions |
Workflow Systems and Technology |
Journal or Publication Title |
it - Information Technology |
ISSN |
2196-7032 |
Page Range |
pp. 247-254 |
Date |
December 2013 |
Export |
