語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Obstructions in Security-Aware Business Processes = Analysis, Detection, and Handling /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Obstructions in Security-Aware Business Processes/ by Julius Holderer.
其他題名:
Analysis, Detection, and Handling /
作者:
Holderer, Julius.
面頁冊數:
XXI, 341 p. 119 illus., 96 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Security Services. -
電子資源:
https://doi.org/10.1007/978-3-658-38154-7
ISBN:
9783658381547
Obstructions in Security-Aware Business Processes = Analysis, Detection, and Handling /
Holderer, Julius.
Obstructions in Security-Aware Business Processes
Analysis, Detection, and Handling /[electronic resource] :by Julius Holderer. - 1st ed. 2022. - XXI, 341 p. 119 illus., 96 illus. in color.online resource.
Why the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process-Aware Information Systems -- Obstruction Modeling -- OLive-M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography.
Open Access
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. About the author Julius Holderer is a researcher in the area of security and compliance in business processes at the Faculty of Engineering of the University of Freiburg (Germany). He is interested in information, IT, and cyber security, as well as policy and process modeling, process automation and mining.
ISBN: 9783658381547
Standard No.: 10.1007/978-3-658-38154-7doiSubjects--Topical Terms:
1211616
Security Services.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Obstructions in Security-Aware Business Processes = Analysis, Detection, and Handling /
LDR
:03347nam a22004335i 4500
001
1088910
003
DE-He213
005
20221101200421.0
007
cr nn 008mamaa
008
221228s2022 gw | s |||| 0|eng d
020
$a
9783658381547
$9
978-3-658-38154-7
024
7
$a
10.1007/978-3-658-38154-7
$2
doi
035
$a
978-3-658-38154-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Holderer, Julius.
$e
author.
$0
(orcid)0000-0002-3452-2427
$1
https://orcid.org/0000-0002-3452-2427
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1396135
245
1 0
$a
Obstructions in Security-Aware Business Processes
$h
[electronic resource] :
$b
Analysis, Detection, and Handling /
$c
by Julius Holderer.
250
$a
1st ed. 2022.
264
1
$a
Wiesbaden :
$b
Springer Fachmedien Wiesbaden :
$b
Imprint: Springer Vieweg,
$c
2022.
300
$a
XXI, 341 p. 119 illus., 96 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Why the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process-Aware Information Systems -- Obstruction Modeling -- OLive-M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography.
506
0
$a
Open Access
520
$a
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. About the author Julius Holderer is a researcher in the area of security and compliance in business processes at the Faculty of Engineering of the University of Freiburg (Germany). He is interested in information, IT, and cyber security, as well as policy and process modeling, process automation and mining.
650
2 4
$a
Security Services.
$3
1211616
650
2 4
$a
Privacy.
$3
575491
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Data protection—Law and legislation.
$3
1366218
650
0
$a
Data protection.
$3
557764
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783658381530
776
0 8
$i
Printed edition:
$z
9783658381554
856
4 0
$u
https://doi.org/10.1007/978-3-658-38154-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-SOB
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入