Securing collaborative business processes: A methodology for security management in service-based infrastructure

5Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The information security is globally applied to business needs, service specifications and infrastructure deployment. Finally, we annotate services with security parameters that could be used to improve the selection of secure services in run-time. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Bou Nassar, P., Badr, Y., Biennier, F., & Barbar, K. (2012). Securing collaborative business processes: A methodology for security management in service-based infrastructure. In IFIP Advances in Information and Communication Technology (Vol. 384 AICT, pp. 480–487). Springer New York LLC. https://doi.org/10.1007/978-3-642-33980-6_52

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free