Proceedings of the Central European Cybersecurity Conference 2018 2018
DOI: 10.1145/3277570.3277588
|View full text |Cite
|
Sign up to set email alerts
|

Aligning Business Process Access Control Policies with Enterprise Architecture

Abstract: Access control policies are a fundamental building block in meeting security and privacy requirements in organizations across business processes, enterprise architectures, and software architectures. Usage of different models for business processes and software makes eliciting and enforcing access control policies hard. Approaches like enterprise architecture management target complex mutual interdependencies between business and IT models but can be hard to apply. We suggest an approach to derive access contr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Zambon et al presented the qualitative time dependency (QualTD) model and approach, to carry out the qualitative assessment of availability risks in IT architectures[27]. Grandy et alproposed pliance of software designs by data flow analyses, to meet security and privacy requirements in organizations across business processes[99].Mayer et al visualized the security analysis of information systems by ArchiMate[108].G. EVALUATION AND VALIDATIONAddicks and Appelrath presented a method allowing for using artifacts of enterprise architectures, to evaluate business applications[18].…”
mentioning
confidence: 99%
“…Zambon et al presented the qualitative time dependency (QualTD) model and approach, to carry out the qualitative assessment of availability risks in IT architectures[27]. Grandy et alproposed pliance of software designs by data flow analyses, to meet security and privacy requirements in organizations across business processes[99].Mayer et al visualized the security analysis of information systems by ArchiMate[108].G. EVALUATION AND VALIDATIONAddicks and Appelrath presented a method allowing for using artifacts of enterprise architectures, to evaluate business applications[18].…”
mentioning
confidence: 99%