A business process-based method on security requirements analysis of information systems

被引:0
|
作者
Yu, ZW [1 ]
Tang, RZ [1 ]
Ye, FB [1 ]
机构
[1] Zhejiang Univ, Inst Mfg Engn, Hangzhou 310027, Peoples R China
关键词
business processes; information systems; security requirements; risk packet; risk transferring model; coverage analysis;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The analysis of security requirements is the important premise and basis of security management. As the change of the background and task of information systems,the asset-based risk analysis methods come out to be out of place. A business process-based security requirements analysis method is put forward. A tri-layer information systems model is established to be the basis and the communication platform of security requirement analysis. The primary security requirements can be listed through analyzing the security requirements of business processes. A concept of risk packet and a risk transferring model are brought forward to facilitate the risk analysis of assets of information systems. Then, a coverage analysis method is used to check whether all kinds of risk of assets are satisfied by the primary security requirements. If some kinds of risk can't be covered by the primary requirements, supplementary requirements will be needed to form the final security requirements list. This method, which aims to protect the security operations of business processes supported by information systems,has strong objective and can facilitate the engineering applications of security management.
引用
收藏
页码:1005 / 1009
页数:5
相关论文
共 50 条
  • [31] Business Process-Based Testing of Web Applications
    Heinecke, Andreas
    Griebe, Tobias
    Gruhn, Volker
    Flemig, Holger
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, 2011, 66 : 603 - +
  • [32] Requirements for Business Process Management Systems Supporting Business Process Agility
    Heininger, Richard
    S-BPM ONE - EDUCATION AND INDUSTRIAL DEVELOPMENTS, 2012, 284 : 168 - 180
  • [33] Communication Analysis: A Requirements Engineering Method for Information Systems
    Espana, Sergio
    Gonzalez, Arturo
    Pastor, Oscar
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2009, 5565 : 530 - +
  • [34] Risk assessment method based on business process-oriented asset evaluation for information system security
    Eom, Jung-Ho
    Park, Seon-Ho
    Han, Young-Ju
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 3, PROCEEDINGS, 2007, 4489 : 1024 - +
  • [35] Research on Core Business Process-based Knowledge Process Model
    Zheng Xiao-dong
    Hu Han-hui
    Gu Hong-rui
    2009 FIFTH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRID (SKG 2009), 2009, : 342 - +
  • [36] Process-based analysis of waste management systems: A case study
    Villeneuve, J.
    Michel, P.
    Fournet, D.
    Lafon, C.
    Menard, Y.
    Wavrer, P.
    Guyonnet, D.
    WASTE MANAGEMENT, 2009, 29 (01) : 2 - 11
  • [37] Eliciting Security Requirements for Business Processes of Legacy Systems
    Argyropoulos, Nikolaos
    Marquez Alcaniz, Luis
    Mouratidis, Haralambos
    Fish, Andrew
    Rosado, David G.
    Garcia-Rodriguez de Guzman, Ignacio
    Fernandez-Medina, Eduardo
    PRACTICE OF ENTERPRISE MODELING, POEM 2015, 2015, 235 : 91 - 107
  • [38] Use of IT process controls to surpass blood banking information systems regulatory and business requirements
    Gentile, P. M.
    Jackson, R.
    TRANSFUSION, 2007, 47 (03) : 243A - 244A
  • [39] Adapting business process modeling techniques for risk analysis of computer based information systems
    Diergardt, M
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 1615 - 1620
  • [40] A Digital Business Analysis Method A Business Requirements Engineering Process by the Cooperation of Management, Business Operation and IT Department
    Yamaguchi, Ichiro
    Furukawa, Masanobu
    Aoyama, Mikio
    Kikushima, Yasuhiro
    REQUIREMENTS ENGINEERING TOWARD SUSTAINABLE WORLD, 2016, 671 : 123 - 131