
• across the whole organisational environment;
• inside and outside organisation’s boundaries.
E-business organisation performs its business activ-
ities by means of e-processes, based on Internet in-
frastructure and technologies.
The uniqueness in running an e-business is in its
‘openness’ to the environment, which is achieved by
means of the various connections and communica-
tion channels with the external world. Although this
‘openness’ makes the e-business mode of doing busi-
ness much more dangerous than the traditional way,
it is essential. The whole business is dependent on
proper business processes execution, which are per-
formed mostly by technological means, with end-user
(customers, company’s employees, company’s sup-
pliers’ employees, etc.) involvement. Therefore, the
security issue becomes one of the most (if not the
most) important issues for e-business organisation.
The e-business security perception changes from
‘blocking’ and ‘preventing’ in the traditional busi-
ness to ‘opening’ and ‘enabling’ the modern e-
process. The e-business process–based security
paradigm (Nachtigal and Mitchell, 2006) provides a
possibility to secure the modern e-business organisa-
tions.
This paper presents a newly introduced set (septet)
of e-business security requirements, as a part of a
newly suggested process-based security paradigm,
which is an alternative for perimeter security ap-
proach. Also, the way of this security requirements
septet implementation is demonstrated in this paper.
The remainder of this paper is structured as fol-
lows: after the principles of the process-based secu-
rity paradigm are presented in the next section, the
seven e-business security criteria are described and
discussed in section three, followed by the descrip-
tion of their implementation in section four, related
works discussion (section five) and conclusions.
2 THE PRINCIPLES OF
E-BUSINESS PROCESS
SECURITY PARADIGM
The basis for that approach is the assumption that
for e-business to exist its processes must be secured.
Hence, the security safeguards design will be dif-
ferentiated between business processes according
to their specific characteristics. The process–based
security approach (Nachtigal and Mitchell, 2006)
includes the following key elements:
• the security is designed and provided for each sin-
gle e-process;
• e-process design is considered to be a result of two
different aspects elements:
– business logic definition;
– information flows transportation and exchange
• the two aspects elements are analysed and security
mechanisms and tools are designed according to
their security requirements criteria.
2.1 e-Business Security Criteria
The three commonly accepted (Gollman, 2003),
(Harris, 2003), (Tettero, 2000), (Moffett et al., 2004)
generic security criteria, or security objectives, are:
• confidentiality;
• integrity;
• availability.
These three security requirements, according to
Tettero (Tettero, 2000) and Harris (Harris, 2003),
come to ensure the following:
• confidentiality—to obtain secrecy and to prevent
unauthorized disclosure of information and data
to unauthorised person;
• integrity is achieved when data and information
are correct and appropriate as meant by the pro-
cess designer (and can not be modified by unau-
thorised person), and accuracy and reliability of
information and systems are in place;
• availability comes to say that data, information
and other elements of information systems are
accessible and useable upon the demand of
authorised user.
Following the process–based security approach in
the e-business environment, these three security ob-
jectives are not sufficient. The modern business en-
vironment is mostly characterised by its connectivity,
which was not the case for the traditional type organ-
isations. The security requirements triad described
above fits the traditional business environment. In or-
der to provide the required security for an e-business
organisation, additional security requirements have to
be in place. According to this research perception, the
e-business security is associated with its e-process se-
curity. Hence, these additional security requirements
have to be considered and provided for e-processes,
namely—additional security requirements are needed
to ensure that business logic and information flows
E-BUSINESS SECURITY DESIGN USING PROCESS SECURITY REQUIREMENTS SEPTET
409