A business process-based method on security requirements analysis of information systems

被引:0
|
作者
Yu, ZW [1 ]
Tang, RZ [1 ]
Ye, FB [1 ]
机构
[1] Zhejiang Univ, Inst Mfg Engn, Hangzhou 310027, Peoples R China
关键词
business processes; information systems; security requirements; risk packet; risk transferring model; coverage analysis;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The analysis of security requirements is the important premise and basis of security management. As the change of the background and task of information systems,the asset-based risk analysis methods come out to be out of place. A business process-based security requirements analysis method is put forward. A tri-layer information systems model is established to be the basis and the communication platform of security requirement analysis. The primary security requirements can be listed through analyzing the security requirements of business processes. A concept of risk packet and a risk transferring model are brought forward to facilitate the risk analysis of assets of information systems. Then, a coverage analysis method is used to check whether all kinds of risk of assets are satisfied by the primary security requirements. If some kinds of risk can't be covered by the primary requirements, supplementary requirements will be needed to form the final security requirements list. This method, which aims to protect the security operations of business processes supported by information systems,has strong objective and can facilitate the engineering applications of security management.
引用
收藏
页码:1005 / 1009
页数:5
相关论文
共 50 条
  • [1] The Development of Process-Based Information Systems: Methodological Requirements
    Pereira, Jose Luis
    Oliveira e Sa, Jorge
    INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 3253 - 3262
  • [2] Study on Business Process-based Risk Analysis of Information System
    Yu Zhiwei
    2012 7TH INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2012, : 779 - 783
  • [3] On capturing process requirements of workflow based business information systems
    Sadiq, W
    Orlowska, ME
    BIS'99: 3RD INTERNATIONAL CONFERENCE ON BUSINESS INFORMATION SYSTEMS, 1999, : 281 - 294
  • [4] Business process modelling and purpose analysis for requirements analysis of information systems
    Luis de la Vara, Jose
    Sanchez, Juan
    Pastor, Oscar
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2008, 5074 : 213 - 227
  • [5] PROQRASS: A PROCESS-BASED APPROACH TO QUALITY REQUIREMENTS ANALYSIS FOR SERVICE SYSTEMS
    Wang, Ye
    Yang, Xiaohu
    Wang, Xinyu
    Kavs, Aleksander J.
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2013, 23 (07) : 943 - 962
  • [6] Secure Information Systems development -: Based on a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 467 - +
  • [7] Analysis approach for enterprise information systems architecture based on hypergraph to aligned business process requirements
    Bouafia, Khawla
    Molnar, Balint
    CENTERIS2019--INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/PROJMAN2019--INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/HCIST2019--INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, 164 : 19 - 24
  • [8] Minimizing the data quality problem of information systems: A process-based method
    Liu, Qi
    Feng, Gengzhong
    Zhao, Xi
    Wang, Wenlong
    DECISION SUPPORT SYSTEMS, 2020, 137
  • [9] A SYSTEMS-OF-INFORMATION IDENTIFICATION METHOD BASED ON BUSINESS PROCESS MODELS ANALYSIS
    Oliveira, Lucas da Silva
    Vieira Vasconcelos, Aline Pires
    Silva, Simone Vasconcelos
    dos Santos, Rodrigo Pereira
    REVISTA GESTAO & TECNOLOGIA-JOURNAL OF MANAGEMENT AND TECHNOLOGY, 2022, 22 (04): : 90 - 115
  • [10] The use of business process modelling in information systems security analysis and design
    Kokolakis, S.A.
    Demopoulos, A.J.
    Kiountouzis, E.A.
    Information Management and Computer Security, 2000, 8 (03): : 107 - 116