Skip to content
You are not logged in |Login  

LEADER 00000cam  2200565 i 4500 
001    on1338233014 
003    OCoLC 
005    20221108213017.0 
006    m     o  d         
007    cr cnu|||unuuu 
008    220803s2022    gw a    ob    000 0 eng d 
019    1337855554 
020    9783658381547|q(electronic book) 
020    365838154X|q(electronic book) 
020    |z9783658381530 
020    |z3658381531 
024 7  10.1007/978-3-658-38154-7|2doi 
035    (OCoLC)1338233014|z(OCoLC)1337855554 
040    GW5XE|beng|erda|epn|cGW5XE|dYDX|dOCLCF 
041 0  eng|bger 
049    STJJ 
050  4 HF5548.2 
072  7 UR|2bicssc 
072  7 UTN|2bicssc 
072  7 COM053000|2bisacsh 
072  7 UR|2thema 
072  7 UTN|2thema 
082 04 658/.05|223/eng/20220803 
100 1  Holderer, Julius,|eauthor. 
245 10 Obstructions in security-aware business processes :
       |banalysis, detection, and handling /|cJulius Holderer. 
264  1 Wiesbaden :|bSpringer Vieweg,|c[2022] 
264  4 |c©2022 
300    1 online resource (xxi, 341 pages) :|billustrations 
       (chiefly color) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
505 0  Why the Automation of Regulation Can Obstruct Business 
       Processes -- Security-Related Obstructability in Process-
       Aware Information Systems -- Obstruction Modeling -- OLive
       -M: A SecANet Use Case for Model-Based Obstruction Solving
       -- OLive-L: SecANet Use Case for Log-Based Obstruction 
       Solving -- Towards Intelligent Security- and Process-Aware
       Information Systems -- Bibliography. 
506 0  Open access|5GW5XE 
520    This Open Access book explores the dilemma-like stalemate 
       between security and regulatory compliance in business 
       processes on the one hand and business continuity and 
       governance on the other. The growing number of regulations,
       e.g., on information security, data protection, or privacy,
       implemented in increasingly digitized businesses can have 
       an obstructive effect on the automated execution of 
       business processes. Such security-related obstructions can
       particularly occur when an access control-based 
       implementation of regulations blocks the execution of 
       business processes. By handling obstructions, security in 
       business processes is supposed to be improved. For this, 
       the book presents a framework that allows the 
       comprehensive analysis, detection, and handling of 
       obstructions in a security-sensitive way. Thereby, methods
       based on common organizational security policies, process 
       models, and logs are proposed. The Petri net-based 
       modeling and related semantic and language-based research,
       as well as the analysis of event data and machine learning
       methods finally lead to the development of algorithms and 
       experiments that can detect and resolve obstructions and 
       are reproducible with the provided software. About the 
       author Julius Holderer is a researcher in the area of 
       security and compliance in business processes at the 
       Faculty of Engineering of the University of Freiburg 
       (Germany). He is interested in information, IT, and cyber 
       security, as well as policy and process modeling, process 
       automation and mining. 
546    Includes abstracts in English and German. 
588 0  Online resource; title from PDF title page (SpringerLink, 
       viewed August 3, 2022). 
590    Springer Nature|bSpringer Nature Open Access eBooks 
650  0 Business|xData processing|xSecurity measures. 
650  7 Business|xData processing|xSecurity measures.|2fast
       |0(OCoLC)fst00842307 
776 08 |cOriginal|z3658381531|z9783658381530|w(OCoLC)1322366654 
914    on1338233014 
947    MARCIVE Processed 2023/02/10 
994    92|bSTJ 
Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource