2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.86
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Approach Towards Risk-Aware Service Level Analysis and Planning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…The Risk-aware Business Process Management (R-BPM) paradigm has recently emerged, aiming to integrate the two traditionally separated fields of risk management and business process management [37,69]. R-BPM promotes risks consideration in all stages of BPM and enables robust and efficient BPM within an uncertain environment.…”
Section: The Research Domain Of R-bpmmentioning
confidence: 99%
See 1 more Smart Citation
“…The Risk-aware Business Process Management (R-BPM) paradigm has recently emerged, aiming to integrate the two traditionally separated fields of risk management and business process management [37,69]. R-BPM promotes risks consideration in all stages of BPM and enables robust and efficient BPM within an uncertain environment.…”
Section: The Research Domain Of R-bpmmentioning
confidence: 99%
“…The integration of risks on business process level is a research topic that has been investigated by several research groups and has introduced many challenges for Risk-aware Business Process Management (R-BPM), which is considered a new management paradigm [37,46,69,72]. Some of the most fundamental challenges relate to the decision of introducing either a pure modeling approach or a pure management approach for R-BPM [56].…”
Section: Introductionmentioning
confidence: 99%
“…The first approach we evaluated was the Risk-Oriented Process Evaluation (ROPE) approach [Tjoa et al, 2008a;Tjoa et al, 2010;Tjoa et al, 2008b;Tjoa et al, 2011;Jakoubi et al, 2007;Jakoubi et al, 2010a;Jakoubi et al, 2010b;Jakoubi et al, 2009b;Jakoubi et al, 2008;Jakoubi and Tjoa, 2009;Goluch et al, 2008]. This approach proposes a three-layer model to capture the notion of "risk" within a business process model.…”
Section: Di01-jakoubi Et Almentioning
confidence: 99%
“…On this topic, this research focuses on the understanding of three key technological trends that define the external scenario. Related to the first, IT infrastructure outsourcing, a decision support framework based on security risks can help define whether or not to outsource some system (Khidzir, et al, 2010), while security models can also help monitor external providers (Jakoubi, et al, 2010). The second, cloud computing, drives the creation of different security risk analysis models (Zhang, et al, 2010), (Müller, et al, 2011).…”
Section: Development Of Secure Information Systemsmentioning
confidence: 99%
“…• Validate risks with provider (CSA, 2009), (CPNI, 2010) • Extend awareness programs (Corriss, 2010) • Isolate work environments • Provide secure remote access • Have backups to SLAs (Jakoubi, et al, 2010) • Obtain information from provider (CSA, 2009), (CPNI, 2010) • Consider service vulnerabilities • Focus on processes and people (Lacey, 2010) • Consider third party devices • Consider remote work environment • Consider provider environment…”
Section: Checkpoints External Scenariomentioning
confidence: 99%