...
首页> 外文期刊>Information and software technology >Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
【24h】

Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach

机译:使用约束编程方法实现业务流程风险处理的自动和最佳选择

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, and hence the potential cost and consequences of the materialization of threats could produce catastrophic loss for organizations. Therefore, the early selection of security controls that mitigate risks is a real and important necessity. Nevertheless, there exists an enormous range of IT security controls and their configuration is a human, manual, time-consuming and error-prone task. Furthermore, configurations are carried out separately from the organization perspective and involve many security stakeholders. This separation makes difficult to ensure the effectiveness of the configuration with regard to organizational requirements. Objective: In this paper, we strive to provide security stakeholders with automated tools for the optimal selection of IT security configurations in accordance with a range of business process scenarios and organizational multi-criteria. Method: An approach based on feature model analysis and constraint programming techniques is presented, which enable the automated analysis and selection of optimal security configurations. Results: A catalogue of feature models is determined by analyzing typical IT security controls for BPMSs for the enforcement of the standard goals of security: integrity, confidentiality, availability, authorization, and authentication. These feature models have been implemented through constraint programs, and Constraint Programming techniques based on optimized and non-optimized searches are used to automate the selection and generation of configurations. In order to compare the results of the determination of configuration a comparative analysis is given. Conclusion: In this paper, we present innovative tools based on feature models, Constraint Programming and multi-objective techniques that enable the agile, adaptable and automatic selection and generation of security configurations in accordance with the needs of the organization.
机译:上下文:在IT领域中已经出现了使用业务流程管理系统(BPMS)进行业务流程自动化的情况。在大多数情况下,默认情况下,在这些系统中安全性问题被忽略,因此,威胁实现的潜在成本和后果可能对组织造成灾难性的损失。因此,尽早选择减轻风险的安全控制是真实而重要的必要条件。尽管如此,仍然存在大量的IT安全控件,其配置是一项人工,手动,耗时且容易出错的任务。此外,配置是从组织角度独立进行的,并且涉及许多安全利益相关者。这种分离使得难以确保有关组织要求的配置的有效性。目标:在本文中,我们致力于根据一系列业务流程场景和组织多标准,为安全利益相关者提供自动工具,以优化IT安全配置。方法:提出了一种基于特征模型分析和约束编程技术的方法,该方法可以自动分析和选择最佳安全配置。结果:通过分析BPMS的典型IT安全控制措施以实现安全性的标准目标:完整性,机密性,可用性,授权和身份验证,来确定功能部件模型的目录。这些功能模型已通过约束程序实现,并且基于优化和非优化搜索的约束编程技术可用于自动选择和生成配置。为了比较确定构型的结果,进行了比较分析。结论:在本文中,我们提出了基于功能模型,约束编程和多目标技术的创新工具,这些工具可以根据组织的需要灵活,适应性强并且自动选择和生成安全配置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号