Detecting conflicts between security and data-minimization requirements is a challenging task. Since such conflicts arise in the specific context of how the technical and organizational components of the target system interact with each other, their detection requires a thorough understanding of the underlying business processes. For example, a process may require anonymous execution for a task that writes data to a secure data storage, where the identity of the writer is needed for the purpose of accountability. To address this challenge, we propose an extension of the BPMN 2.0 business process modeling language to enable: (i) the specification of process-oriented data-minimization and security requirements, (ii) the detection of conflicts between these requirements based on a catalog of domain-independent anti-patterns. The considered security requirements were reused from SecBPMN2, a security-oriented extension of BPMN 2.0, while the data-minimization part is new. SecBPMN2 also provides a graphical query language called SecBPMN2-Q, which we extended to formulate our anti-patterns. We report on feasibility and usability of our approach based on a case study featuring a healthcare management system, and an experimental user study.

(2018). Detecting conflicts between data-minimization and security requirements in business process models . Retrieved from https://hdl.handle.net/10446/324016

Detecting conflicts between data-minimization and security requirements in business process models

Salnitri, Mattia;
2018-01-01

Abstract

Detecting conflicts between security and data-minimization requirements is a challenging task. Since such conflicts arise in the specific context of how the technical and organizational components of the target system interact with each other, their detection requires a thorough understanding of the underlying business processes. For example, a process may require anonymous execution for a task that writes data to a secure data storage, where the identity of the writer is needed for the purpose of accountability. To address this challenge, we propose an extension of the BPMN 2.0 business process modeling language to enable: (i) the specification of process-oriented data-minimization and security requirements, (ii) the detection of conflicts between these requirements based on a catalog of domain-independent anti-patterns. The considered security requirements were reused from SecBPMN2, a security-oriented extension of BPMN 2.0, while the data-minimization part is new. SecBPMN2 also provides a graphical query language called SecBPMN2-Q, which we extended to formulate our anti-patterns. We report on feasibility and usability of our approach based on a case study featuring a healthcare management system, and an experimental user study.
2018
Inglese
Modelling Foundations and Applications. 14th European Conference, ECMFA 2018, Held as Part of STAF 2018, Proceedings
978-3-319-92996-5
10890
179
198
cartaceo
online
Switzerland
Springer
ECMFA 2018: 14th European Conference on Modelling Foundations and Applications, Held as Part of STAF 2018; Toulouse, France, June 26-28, 2018
14
Tolosa (Francia)
June 26-28, 2018
internazionale
contributo
Settore IINF-05/A - Sistemi di elaborazione delle informazioni
BPMN; Conflicts; Data-minimization; Security
info:eu-repo/semantics/conferenceObject
5
Ramadan, Q.; Struber, D.; Salnitri, Mattia; Riediger, V.; Jurjens, J.
1.4 Contributi in atti di convegno - Contributions in conference proceedings::1.4.01 Contributi in atti di convegno - Conference presentations
reserved
Non definito
273
(2018). Detecting conflicts between data-minimization and security requirements in business process models . Retrieved from https://hdl.handle.net/10446/324016
File allegato/i alla scheda:
File Dimensione del file Formato  
978-3-319-92997-2_compressed.pdf

Solo gestori di archivio

Versione: publisher's version - versione editoriale
Licenza: Licenza default Aisberg
Dimensione del file 5.73 MB
Formato Adobe PDF
5.73 MB Adobe PDF   Visualizza/Apri
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/324016
Citazioni
  • Scopus 15
  • ???jsp.display-item.citation.isi??? 12
social impact