Secure business process engineering: a socio-technical approach

Mattia Salnitri PhD Thesis Defence

29 aprile 2016
Versione stampabile

Date: April 29, 2016        
Time: 13:00
Location: Meeting room Ofek - Polo scientifico e tecnologico "Fabio Ferrari" (Building Povo 1, via Sommarive 5 – Povo, Trento)

Speaker 
  • Mattia Salnitri, University of Trento
Abstract

Dealing with security is a central activity for todays organizations. Security breaches impact on the activities executed in organizations, preventing them to execute their business processes and, therefore, causing millions of dollars of losses. Security by design principles underline the importance of considering security as early as during the design of organizations to avoid expensive fixes during later phases of their lifecycle. However, the design of secure business processes cannot take into account only security aspects on the sequences of activities. Security reports in the last years demonstrate that security breaches are more and more caused by attacks that take advantage of social vulnerabilities. Therefore, those aspects should be analyzed in order to design a business process robust to technical and social attacks. Still, the mere design of business processes does not guarantee that their correct execution, such business processes have to be correctly implemented and performed.
We propose SEcure Business process Engineering (SEBE), a method that considers social and organizational aspects for designing and imple- menting secure business processes. SEBE provides an iterative and incremental process and a set of verification of transformation rules, supported by a software tool, that integrate different modeling languages used to specify social security aspects, business processes and the implementation code. In particular, SEBE provides a new modeling language which permits to specify business processes with security concepts and complex security constraints.
We evaluated the effectiveness of SEBE for engineering secure business processes with two empirical evaluations and applications of the method to three real scenarios.

Contact: Mattia Salnitri, mattia.salnitri [at] unitn.it