authorities and responsibility in order to ensure that
activities are carried out by the authorized actors.
The approach and method used in (Firesmith,
2003) is based on the extension of UML. In
particular, the author proposes a method to derive
security use cases in order to model a problem
domain for secure application development.
Actually, due to its popularity as a requirements
elicitation method, the security use case approach
has been researched and developed by many
researchers.
Another popular and widely used modeling
language and method extended with security
properties is BPMN (business process modeling
notation). In (Rodríguez et al., 2007), the authors
integrate security requirements through business
process modeling. In particular, they propose a
BPMN extension to business process diagrams.
One of the dominant reasons that the role of
business process modeling in IS security is
undermined is because often the methods restrict
themselves to merely the conceptual and semantic
levels and, therefore, present little pragmatic value
for information system designers and developers. By
using the existing methods, it is difficult to
automatically analyze the models and, therefore, it is
not possible to test and simulate the embedded
security measures. To elevate the importance and
pragmatic value of security-driven business process
modeling, it is required that the models possess
certain qualities. First of all, the resultant model
should be amenable to test and simulation in order to
capture how and when security safeguards will be
triggered and enacted. Secondly, the models should
capture social roles, authorities and responsibilities
pertaining to each action. Thirdly, it is imperative
that the models capture interactions between
different entities (human actors, business units,
applications) to identify the level of security
sensitivity (e.g., access and modification of sensitive
data or inter-organizational transactions may be of
special security scrutiny). These qualities are the
research motivations and drivers for this paper. In
this paper, it is attempted to show that the proposed
method and approach for developing secure business
processes yield the mentioned qualities to a certain
extent and advances the existing experience from
both a theoretical and an application perspective.
The contribution of this paper is the proposal of a
conceptual model for developing secure business
processes, an approach to implement the conceptual
model, and a secure business process modeling
method. The advantage of the proposed method is its
underlying formal semantics, which allows models
to be automatically analyzed and simulated. In the
proposed approach, emphasis is made on the social
characteristics of the system by associating each
social actor to their authorities, responsibilities and
obligations. In this paper we use the DEMO
methodology transaction concept (Dietz, 2006) for
business process modeling, and the Norm Analysis
Method (Stamper, 1994) for incorporating security
safeguards into the model.
3 CONCEPTUAL MODEL
The proposed conceptual model for secure BPM,
illustrated in Figure 1, has two main components
that need to be developed and combined to create a
secure business process model. The first component
consists of the ‘business transactions’ that needs to
be identified based on a ‘business processes
description’. The second component is ‘security
safeguards’ that are mainly defined based on
security determiners (see below for definition) and
represents a set of security safeguards that are
defined in conjunction with each business
transaction. These two components are developed in
a collaborative manner (see Figure 2) and in
correlation with each other. Together, the two
components create a secure BPM, as depicted in
Figure 1 and enclosed into the dashed-line rectangle.
Figure 1: Conceptual model of security embedded BPM.
Security determiners – these are rules,
procedures, laws, and other measures that an
organization wants to be implemented with regard to
certain activities, processes, and roles.
For example: The ‘security determiners’ define if
a transaction execution involves any action on
sensitive personal records (read, delete, modify), or
whether a transaction is executed in the boundary of
two organizations requiring more security
(transmitting credit card information, health care
records), and so on. For each such transaction,
security rules, security precautions, and security
alerts are formulated at the concept level.
Once security safeguards are defined, business
transactions are coupled with their corresponding
ICEIS 2009 - International Conference on Enterprise Information Systems
214