000 | 03729nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-658-38154-7 | ||
003 | DE-He213 | ||
005 | 20240423125444.0 | ||
007 | cr nn 008mamaa | ||
008 | 220723s2022 gw | s |||| 0|eng d | ||
020 |
_a9783658381547 _9978-3-658-38154-7 |
||
024 | 7 |
_a10.1007/978-3-658-38154-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aHolderer, Julius. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aObstructions in Security-Aware Business Processes _h[electronic resource] : _bAnalysis, Detection, and Handling / _cby Julius Holderer. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aWiesbaden : _bSpringer Fachmedien Wiesbaden : _bImprint: Springer Vieweg, _c2022. |
|
300 |
_aXXI, 341 p. 119 illus., 96 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aWhy the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process-Aware Information Systems -- Obstruction Modeling -- OLive-M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography. | |
506 | 0 | _aOpen Access | |
520 | _aThis Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, aswell as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. About the author Julius Holderer is a researcher in the area of security and compliance in business processes at the Faculty of Engineering of the University of Freiburg (Germany). He is interested in information, IT, and cyber security, as well as policy and process modeling, process automation and mining. | ||
650 | 0 | _aData protection. | |
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aPrivacy. |
650 | 2 | 4 | _aSecurity Services. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783658381530 |
776 | 0 | 8 |
_iPrinted edition: _z9783658381554 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-658-38154-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-SOB | ||
942 | _cSPRINGER | ||
999 |
_c178119 _d178119 |