Securing collaborative business processes: A methodology for security management in service-based infrastructure. Bou Nassar, P., Badr, Y., Biennier, F., & Barbar, K. Volume 384 AICT , 2012. abstract bibtex In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The information security is globally applied to business needs, service specifications and infrastructure deployment. Finally, we annotate services with security parameters that could be used to improve the selection of secure services in run-time. © 2012 IFIP International Federation for Information Processing.
@book{
title = {Securing collaborative business processes: A methodology for security management in service-based infrastructure},
type = {book},
year = {2012},
source = {IFIP Advances in Information and Communication Technology},
identifiers = {[object Object]},
keywords = {Business Process Modeling,Business Processes,Methodology,Risk Management,Service Oriented-Architecture},
volume = {384 AICT},
id = {497f3ee1-2b27-300a-ba25-ecb728bf4e55},
created = {2018-02-20T21:30:52.324Z},
file_attached = {false},
profile_id = {54318c42-96bc-3aaf-a27d-ca643ea40072},
last_modified = {2018-02-20T21:30:52.324Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {false},
hidden = {false},
private_publication = {false},
abstract = {In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The information security is globally applied to business needs, service specifications and infrastructure deployment. Finally, we annotate services with security parameters that could be used to improve the selection of secure services in run-time. © 2012 IFIP International Federation for Information Processing.},
bibtype = {book},
author = {Bou Nassar, P. and Badr, Y. and Biennier, F. and Barbar, K.}
}
Downloads: 0
{"_id":"2zbNkxDk6EzzFXfD2","bibbaseid":"bounassar-badr-biennier-barbar-securingcollaborativebusinessprocessesamethodologyforsecuritymanagementinservicebasedinfrastructure-2012","downloads":0,"creationDate":"2018-02-20T21:35:34.723Z","title":"Securing collaborative business processes: A methodology for security management in service-based infrastructure","author_short":["Bou Nassar, P.","Badr, Y.","Biennier, F.","Barbar, K."],"year":2012,"bibtype":"book","biburl":null,"bibdata":{"title":"Securing collaborative business processes: A methodology for security management in service-based infrastructure","type":"book","year":"2012","source":"IFIP Advances in Information and Communication Technology","identifiers":"[object Object]","keywords":"Business Process Modeling,Business Processes,Methodology,Risk Management,Service Oriented-Architecture","volume":"384 AICT","id":"497f3ee1-2b27-300a-ba25-ecb728bf4e55","created":"2018-02-20T21:30:52.324Z","file_attached":false,"profile_id":"54318c42-96bc-3aaf-a27d-ca643ea40072","last_modified":"2018-02-20T21:30:52.324Z","read":false,"starred":false,"authored":"true","confirmed":false,"hidden":false,"private_publication":false,"abstract":"In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The information security is globally applied to business needs, service specifications and infrastructure deployment. Finally, we annotate services with security parameters that could be used to improve the selection of secure services in run-time. © 2012 IFIP International Federation for Information Processing.","bibtype":"book","author":"Bou Nassar, P. and Badr, Y. and Biennier, F. and Barbar, K.","bibtex":"@book{\n title = {Securing collaborative business processes: A methodology for security management in service-based infrastructure},\n type = {book},\n year = {2012},\n source = {IFIP Advances in Information and Communication Technology},\n identifiers = {[object Object]},\n keywords = {Business Process Modeling,Business Processes,Methodology,Risk Management,Service Oriented-Architecture},\n volume = {384 AICT},\n id = {497f3ee1-2b27-300a-ba25-ecb728bf4e55},\n created = {2018-02-20T21:30:52.324Z},\n file_attached = {false},\n profile_id = {54318c42-96bc-3aaf-a27d-ca643ea40072},\n last_modified = {2018-02-20T21:30:52.324Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n private_publication = {false},\n abstract = {In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The information security is globally applied to business needs, service specifications and infrastructure deployment. Finally, we annotate services with security parameters that could be used to improve the selection of secure services in run-time. © 2012 IFIP International Federation for Information Processing.},\n bibtype = {book},\n author = {Bou Nassar, P. and Badr, Y. and Biennier, F. and Barbar, K.}\n}","author_short":["Bou Nassar, P.","Badr, Y.","Biennier, F.","Barbar, K."],"bibbaseid":"bounassar-badr-biennier-barbar-securingcollaborativebusinessprocessesamethodologyforsecuritymanagementinservicebasedinfrastructure-2012","role":"author","urls":{},"keyword":["Business Process Modeling","Business Processes","Methodology","Risk Management","Service Oriented-Architecture"],"downloads":0},"search_terms":["securing","collaborative","business","processes","methodology","security","management","service","based","infrastructure","bou nassar","badr","biennier","barbar"],"keywords":["business process modeling","business processes","methodology","risk management","service oriented-architecture"],"authorIDs":[]}