Abstract
IT security becomes increasingly important due to the rise of cybercrime incidents but also obligatory security and privacy laws that include confidentiality regulations. To prevent cybercriminal attacks, the business level has to identify critical business data and introduce organization-wide security standards. A close cooperation with the IT level is crucial to avoid mistakes and misunderstandings of security requirements, both may cause severe security breaches. An important building block are access control requirements (ACRs). In a costly, complex and manual role engineering process, experts have to elicit appropriate role-based access control (RBAC) policies according to business security and confidentiality models. This paper makes a first step to close this gap with an approach that automatically extracts business level ACRs from BPMN business processes to build an initial RBAC role model and establish traceability from RBAC policies to business processes. Case study results indicate that the accuracy of extracted policies is appropriate, adaptations in evolution scenarios become faster and human errors are reduced during the engineering of RBAC policies.
Author supplied keywords
Cite
CITATION STYLE
Pilipchuk, R., Heinrich, R., & Reussner, R. (2021). Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies. In International Conference on Information Systems Security and Privacy (pp. 300–307). Science and Technology Publications, Lda. https://doi.org/10.5220/0010184403000307
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.