000 03729nam a22005415i 4500
001 978-3-658-38154-7
003 DE-He213
005 20240423125444.0
007 cr nn 008mamaa
008 220723s2022 gw | s |||| 0|eng d
020 _a9783658381547
_9978-3-658-38154-7
024 7 _a10.1007/978-3-658-38154-7
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aHolderer, Julius.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aObstructions in Security-Aware Business Processes
_h[electronic resource] :
_bAnalysis, Detection, and Handling /
_cby Julius Holderer.
250 _a1st ed. 2022.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer Vieweg,
_c2022.
300 _aXXI, 341 p. 119 illus., 96 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aWhy the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process-Aware Information Systems -- Obstruction Modeling -- OLive-M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography.
506 0 _aOpen Access
520 _aThis Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, aswell as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. About the author Julius Holderer is a researcher in the area of security and compliance in business processes at the Faculty of Engineering of the University of Freiburg (Germany). He is interested in information, IT, and cyber security, as well as policy and process modeling, process automation and mining.
650 0 _aData protection.
650 0 _aData protection
_xLaw and legislation.
650 1 4 _aData and Information Security.
650 2 4 _aPrivacy.
650 2 4 _aSecurity Services.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783658381530
776 0 8 _iPrinted edition:
_z9783658381554
856 4 0 _uhttps://doi.org/10.1007/978-3-658-38154-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SOB
942 _cSPRINGER
999 _c178119
_d178119