A business process-based method on security requirements analysis of information systems

被引:0
|
作者
Yu, ZW [1 ]
Tang, RZ [1 ]
Ye, FB [1 ]
机构
[1] Zhejiang Univ, Inst Mfg Engn, Hangzhou 310027, Peoples R China
关键词
business processes; information systems; security requirements; risk packet; risk transferring model; coverage analysis;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The analysis of security requirements is the important premise and basis of security management. As the change of the background and task of information systems,the asset-based risk analysis methods come out to be out of place. A business process-based security requirements analysis method is put forward. A tri-layer information systems model is established to be the basis and the communication platform of security requirement analysis. The primary security requirements can be listed through analyzing the security requirements of business processes. A concept of risk packet and a risk transferring model are brought forward to facilitate the risk analysis of assets of information systems. Then, a coverage analysis method is used to check whether all kinds of risk of assets are satisfied by the primary security requirements. If some kinds of risk can't be covered by the primary requirements, supplementary requirements will be needed to form the final security requirements list. This method, which aims to protect the security operations of business processes supported by information systems,has strong objective and can facilitate the engineering applications of security management.
引用
收藏
页码:1005 / 1009
页数:5
相关论文
共 50 条
  • [21] The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes
    Goudalo, Wilson
    Seret, Dominique
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 105 - 113
  • [22] Study on the Business Process Procedure Based on the Analysis of Requirements
    Park, Sunyi
    Kim, Taewoo
    Yeo, Jeongmo
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 479 - 486
  • [23] Method for process-based modeling of combat scenarios using interaction analysis weapon systems
    Jeong, Dongsu
    Kim, Dohyun
    Seo, Yoonho
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (03) : 415 - 436
  • [24] Method Support of Information Requirements Analysis for Analytical Information Systems
    Stroh, Florian
    Winter, Robert
    Wortmann, Felix
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2011, 3 (01): : 33 - 43
  • [25] Process-based Requirement Analysis on Business Intelligence in Mobile Electronic Commerce
    Deng, Xiaoyi
    Jin, Chun
    Ding, Jiangbo
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 1138 - 1143
  • [26] Using Structural Polymorphism in Creating Process-Based Management Information Systems
    Shvedenko, V. N.
    Shvedenko, V. V.
    Shchekochikhin, O., V
    AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS, 2018, 52 (06) : 290 - 296
  • [27] Using Structural Polymorphism in Creating Process-Based Management Information Systems
    V. N. Shvedenko
    V. V. Shvedenko
    O. V. Shchekochikhin
    Automatic Documentation and Mathematical Linguistics, 2018, 52 (6) : 290 - 296
  • [28] Designing and Implementing Information Systems for Records: The Approach Based on Business Process Analysis
    Xie, Sherry L.
    Ma, Linqing
    2011 INTERNATIONAL CONFERENCE ON ECONOMIC AND INFORMATION MANAGEMENT (ICEIM 2011), 2011, : 53 - 56
  • [29] A Business Process-based Risk Evaluation Framework
    Yu, Zhiwei
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY, PTS 1-3, 2011, 230-232 : 1024 - 1028
  • [30] Business Process-Based Resource Importance Determination
    Fenz, Stefan
    Ekelhart, Andreas
    Neubauer, Thomas
    BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2009, 5701 : 113 - +