on a community drive case study as mentioned ear-
lier. We explained how the algorithm works in Sec. 3,
which is fully automated. Hence, we could not influ-
ence results during these steps. For the last step, we
explained our metrics and classifications in Sect. 4.1.
5 CONCLUSION
The business level increasingly focuses on IT security
due to the rising threat of cybercrime and number of
security and privacy laws. Incorporate correct and se-
cure ACRs is challenging. There is a communication
gap between the business level and IT level, giving
potential for security breaches in access control.
This paper tries to overcome this gap by extracting
business level ACRs from business processes to gen-
erate an initial role model for RBAC. A case study-
based evaluation undermines that the proposed ap-
proach increases the efficiency of engineering the role
model with an automated extraction of business level
ACRs. Furthermore, this leads to a reduction human
errors that, otherwise would lead to security breaches.
This becomes especially crucial during evolution sce-
narios where the role model requires repetitive adap-
tations. In our future work, we will apply BAcsTract
to a real-world case study to further assess its accu-
racy. Furthermore, we will extend BAcsTract to trans-
fer the extracted business level ACRs to enterprise
application architectures (EAA) to identify forbidden
data flows in an early design phase and help the enter-
prise architect building a business level aligned EAA.
REFERENCES
Aerts, A. et al. (2004). Architectures in context: on the
evolution of business and ICT platform architectures.
Information and Management, pages 781–794.
Alpers, S. et al. (2018). Identifying needs for a holistic mod-
elling approach to privacy aspects in enterprise soft-
ware systems. In the International Conference on In-
formation Systems Security and Privacy, pages 74–82.
Alpers, S. et al. (2019). The current state of the holistic pri-
vacy and security modelling approach in business pro-
cess and software architecture modelling. Information
Systems Security and Privacy, pages 109–124.
AXELOS (2011). ITIL. Accessed: February 25, 2019.
Basili, R. et al. (1994). The goal question metric approach.
Encyclopedia of Software Engineering, 1.
Brucker, A. D. et al. (2012). SecureBPMN: Modeling and
enforcing access control requirements in business pro-
cesses. In ACM symposium on access control models
and technologies (SACMAT), pages 123–126.
Colantonio, A. et al. (2009). A formal framework to elicit
roles with business meaning in rbac systems. In ACM
symposium on access control models and technologies
(SACMAT), pages 85–94.
Coyne, E. J. (1996). Role engineering. In Proceedings of
the ACM Workshop on Role-based access control.
Crook, R. et al. (2001). Modelling access policies using
roles in requirements engineering. Information and
Software Technology, 45:979–991.
European Union (2016). General data protection regulation.
Federal Republic of Germany (2015). IT Security Act.
Ferraiolo, D. et al. (2007). Role-Based Access Control.
Artech House Publishers.
Fuchs, L. et al. (2007). Supporting compliant and secure
user handling - a structured approach for in-house
identity management. In The Second International
Conference on Availability, Reliability and Security
(ARES’07), pages 374–384.
Fuchs, L. et al. (2008). Hydro hybrid development of roles.
In Information Systems Security, pages 287–302.
Haight, J. (2019). Automated control systems do they re-
duce human error and incidents? ASSE Professional
Development Conference and Exposition.
Heinrich, R. et al. (2016). The cocome platform for col-
laborative empirical research on information system
evolution. Technical Report 2, Karlsruhe.
INCITS (2012). INCITS 359-2012 - role based access con-
trol standard.
ISO/IEC (2018). ISO 27000.
Lee, H. et al. (2004). A framework for modeling organiza-
tion structure in role engineering. In Applied Parallel
Computing (PARA).
Mark, S. (2010). Scenario-driven role engineering. IEEE
Security and Privacy.
Mitra, B. et al. (2016). A survey of role mining. ACM
Comput. Surv., 48(4):37.
Narouei, M. et al. (2015). Towards an automatic top-down
role engineering approach using natural language pro-
cessing techniques. In ACM symposium on access
control models and technologies, pages 157–160.
O’Connor, A. et al. (2010). NIST economic analysis of role-
based access control. Technical report.
OMG (2011). Business process model and notation v2.0.2.
Pilipchuk, R. (2018). Coping with access control require-
ments in the context of mutual dependencies between
business and it. In Proceedings of the Central Euro-
pean Cybersecurity Conference, pages 16:1–16:4.
Pilipchuk, R. et al. (2017). Defining a security-oriented evo-
lution scenario for the cocome case study. In 4nd Col-
laborative Workshop on Evolution and Maintenance
of Long-Living Software Systems, pages 60–77.
Ramadan, Q. et al. (2018). Integrating bpmn- and uml-
based security engineering via model transformation.
In Proceedings of the SE 2018, pages 63–64.
Roeckle, H. et al. (2000). Process-oriented approach for
role-finding to implement role-based security admin-
istration in a large industrial organization. In Work-
shop on Role-based access control, pages 103–110.
Runeson, P. et al. (2012). Case Study Research in Software
Engineering: Guidelines. John Wiley & Sons, Inc.
Wieringa, R. J. et al. (2003). Aligning Application Architec-
ture to the Business Context, pages 209–225.
Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies
307