A business process-based method on security requirements analysis of information systems

被引:0
|
作者
Yu, ZW [1 ]
Tang, RZ [1 ]
Ye, FB [1 ]
机构
[1] Zhejiang Univ, Inst Mfg Engn, Hangzhou 310027, Peoples R China
关键词
business processes; information systems; security requirements; risk packet; risk transferring model; coverage analysis;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The analysis of security requirements is the important premise and basis of security management. As the change of the background and task of information systems,the asset-based risk analysis methods come out to be out of place. A business process-based security requirements analysis method is put forward. A tri-layer information systems model is established to be the basis and the communication platform of security requirement analysis. The primary security requirements can be listed through analyzing the security requirements of business processes. A concept of risk packet and a risk transferring model are brought forward to facilitate the risk analysis of assets of information systems. Then, a coverage analysis method is used to check whether all kinds of risk of assets are satisfied by the primary security requirements. If some kinds of risk can't be covered by the primary requirements, supplementary requirements will be needed to form the final security requirements list. This method, which aims to protect the security operations of business processes supported by information systems,has strong objective and can facilitate the engineering applications of security management.
引用
收藏
页码:1005 / 1009
页数:5
相关论文
共 50 条
  • [41] E-business security design using process security requirements septet
    Nachtigal, S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 408 - 413
  • [42] Collective Adaptation in Process-Based Systems
    Bucchiarone, Antonio
    Mezzina, Claudio Antares
    Pistore, Marco
    Raik, Heorhi
    Valetto, Giuseppe
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS (SASO), 2014, : 151 - 156
  • [43] Business Process-Based Modeling of Enterprise Communication Network
    Hosseinioun, Mir Hossein
    Houshmand, Monireh
    2014 INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK), 2014,
  • [44] A Model Driven Approach to Business Process-Based Learning
    Subramanian, Venkatapathy
    Bertolino, Antonia
    COMPUTERS SUPPORTED EDUCATION, 2017, 739 : 317 - 335
  • [45] A Business Software Testing Process-Based Model Design
    Vukovic, Vuk
    Djurkovic, Jovica
    Trninic, Jelica
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2018, 28 (05) : 701 - 749
  • [46] Business model innovation: a review of the process-based literature
    Andreini, Daniela
    Bettinelli, Cristina
    Foss, Nicolai J.
    Mismetti, Marco
    JOURNAL OF MANAGEMENT AND GOVERNANCE, 2022, 26 (04): : 1089 - 1121
  • [47] Business model innovation: a review of the process-based literature
    Daniela Andreini
    Cristina Bettinelli
    Nicolai J. Foss
    Marco Mismetti
    Journal of Management and Governance, 2022, 26 : 1089 - 1121
  • [48] A process-based quality management information system
    Chin, S
    Kim, K
    Kim, YS
    AUTOMATION IN CONSTRUCTION, 2004, 13 (02) : 241 - 259
  • [49] Business process-driven information requirements engineering
    Becker, J
    Brelage, C
    Dreiling, A
    Ribbert, M
    INNOVATIONS THROUGH INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2004, : 352 - 356
  • [50] Identification of Security Requirements in Systems of Systems by Functional Security Analysis
    Fuchs, Andreas
    Rieke, Roland
    ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96