Securing collaborative business processes: A methodology for security management in service-based infrastructure

Pascal Bou Nassar, Youakim Badr, Frédérique Biennier, Kablan Barbar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The information security is globally applied to business needs, service specifications and infrastructure deployment. Finally, we annotate services with security parameters that could be used to improve the selection of secure services in run-time.

Original languageEnglish (US)
Title of host publicationAdvances in Production Management Systems, Value Networks
Subtitle of host publicationInnovation, Technologies, and Management - IFIP WG 5.7 International Conference, APMS 2011, Revised Selected Papers
PublisherSpringer New York LLC
Pages480-487
Number of pages8
ISBN (Print)9783642339790
DOIs
StatePublished - 2012
EventIFIP WG 5.7 International Conference on Advances in Production Management Systems, Value Networks: Innovation, Technologies, and Management, APMS 2011 - Stavanger, Norway
Duration: Sep 26 2011Sep 28 2011

Publication series

NameIFIP Advances in Information and Communication Technology
Volume384 AICT
ISSN (Print)1868-4238

Conference

ConferenceIFIP WG 5.7 International Conference on Advances in Production Management Systems, Value Networks: Innovation, Technologies, and Management, APMS 2011
CountryNorway
CityStavanger
Period9/26/119/28/11

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Securing collaborative business processes: A methodology for security management in service-based infrastructure'. Together they form a unique fingerprint.

Cite this