Secure business process model specification through a UML 2.0 activity diagram profile

0
117

Authors: Alfonso Rodríguez, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini

Tags: 2011, conceptual modeling

Business processes have become important resources, both for an enterprise’s performance and to enable it to maintain its competitiveness. The languages used for business process representation have, in recent years, been improved and new notations have appeared. However, despite the wide acceptance of the importance of business process security, to date the business analyst perspective in relation to security has hardly been dealt with. Moreover, security requirements cannot be represented in modern business process modeling notations. In this paper, we present an extension of UML 2.0 activity diagrams which will allow security requirements to be specified in business processes. Our proposal, denominated as BPSec (Business Process Security), is Model Driven Architecture compliant since it is possible to obtain a set of UML artifacts (Platform Independent Model-PIM) used in software development from a Secure Business Process model specification (Computation Independent Model-CIM).We also present the application of our approach to an example based on a typical health care institution, in which our M-BPSec method is employed as a framework for the use of our UML extension.

Read the full paper here: https://pdf.sciencedirectassets.com/271653/1-s2.0-S0167923611X00052/1-s2.0-S0167923611000479/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjENb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJGMEQCIEJl1bwR1Kmz1zF7p%2F%2BNtCThRIrga%2ByLEFrQY1Ksx4ucAiA%2FlAOfpfc3QzdWV1aSCbv%2BBX7PA3oVb4ZOo60eQRLc%2Byq9Awi%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAMaDDA1OTAwMzU0Njg2NSIMY9wO56B9KXToNrC7KpEDjXkI2lv5R38XCRTNx1B518oh8AfMxqIkmdLX1c1ruqGxc90MC4iCVTr4elO9Ot2N1bD5BG79DVbvyVXXTirS3Zkpvy%2FNBvPzwDOSS8wtdwja4U6iSLi3RFg2V7Yd2GP0VSRa%2B4Z8S7hFNEnV23VjtrExuiJZAyi5rBHPOSd%2F3oAyPSlFcAzpQzjlo2gEJmQUWjas6k8yeRU8na6HwNqEr0t%2FQW5PLuVpZVZJkVzpU8PNqRg4c%2B1e08K%2BWmW%2FNwuPvdNqO8Y7QeWZ4yRvBn5EwkullRY6say%2BHH3AX%2FHMUFZ9CY9iySSgRYQ86HY76T56tL6qew%2FcD9kLU26OejbqdtCkMKlTsQbWEQGPGeeI5wsBvHvl%2BM99U1KLfGjP%2F288mvrytp%2BBGZ9jDssxBxFkCqEajxpeTavFl60IVw7Ksg%2B2ly8CpOmJYh97z6slHC2uxQnpZJVWocAa6w9O5gs4a8Xy7EZSgv%2BWWa%2BENhKi6NdrmE510J9C0GZ%2BGlUzoE4yz8g8L8kt5wuX%2B6Rxudpuv4sw4a%2BU%2BgU67AH5ioNsjVV%2FZ74OZHvorKpIp7rYbNLdma9zJF8NKdE6otTvJhB594XQaVTs1uEUcSSurrS%2FQicyNGSJAEtv5kG2457eDpeQqzpkOqNs6wBWxcE9D5iM1dAvwp%2FVZkz8jgjwvd%2FWNcrIqUU95qbuzP7Vad%2BfivRcIOZEiejCuNJkvTz4eKRpTFZN87HHKN9NWvOZRNjLPAUo4r6ZJvJoXjKdmYEhMgWrOr2Ay%2FRbF%2FtWB4Ig7eyvXliUNXuDj8Xu7DCllZ%2BFdAwDvnqmdF8HYiJO1%2F5ykmzlJSejY6HT5RPLcoZULOLC9UsPxZmaZg%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200825T142822Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTY6YTABLVJ%2F20200825%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=e65839d89bfc0d57bd31f091c3ff8e72d438623c226d24bfc4031328a7807cd0&hash=133a7ee1cb6620d270ec8294a95285e5bc12f1f3ed9975eb3d8c0cd9ea00f03a&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S0167923611000479&tid=spdf-7a662e6a-066d-4c9f-9bbc-880e0397ef42&sid=6675431d1f93d24bc00a2406701bcf4bbb2agxrqa&type=client