loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: S. Nachtigal and C. J. Mitchell

Affiliation: Royal Holloway, University of London, United Kingdom

Keyword(s): e-business, information security model, business process, information flows, perimeter security.

Related Ontology Subjects/Areas/Topics: Enterprise Information Systems ; Formal Methods ; Information and Systems Security ; Information Systems Analysis and Specification ; Methodologies and Technologies ; Operational Research ; Security ; Security in Information Systems ; Simulation and Modeling ; Workflow and Business Process Security

Abstract: Organisations (enterprises, businesses, government institutions, etc.) have changed their way of doing business from a traditional approach to embrace e-business processes. This change makes the perimeter security approach inappropriate for such organisations. The well-known and widely used security mechanisms, including cryptography-based tools and techniques, cannot provide a sufficient level of security without being a part of a comprehensive organisational approach/philosophy. This approach must be different from the current dominant approach, i.e. perimeter security, and must focus on different organisational components. In this paper we suggest a process security approach, and describe ongoing research with the aim of developing an e-business security model based on this new, process security, approach.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.129.249.170

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Nachtigal, S. and J. Mitchell, C. (2006). MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES. In Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT; ISBN 978-972-8865-63-4; ISSN 2184-3236, SciTePress, pages 459-464. DOI: 10.5220/0002103404590464

@conference{secrypt06,
author={S. Nachtigal. and C. {J. Mitchell}.},
title={MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT},
year={2006},
pages={459-464},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002103404590464},
isbn={978-972-8865-63-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT
TI - MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES
SN - 978-972-8865-63-4
IS - 2184-3236
AU - Nachtigal, S.
AU - J. Mitchell, C.
PY - 2006
SP - 459
EP - 464
DO - 10.5220/0002103404590464
PB - SciTePress