Managing business compliance using model-driven security management

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology. © 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden.

Cite

CITATION STYLE

APA

Lang, U., & Schreiner, R. (2009). Managing business compliance using model-driven security management. In ISSE 2008 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference (pp. 231–241). https://doi.org/10.1007/978-3-8348-9283-6_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free