valuable insights in the minimum set of required ac-
cess rights or the data a role has access to. Otherwise,
gathering this information can be cumbersome and
error-prone. Researchers can use the automated anal-
yses as benchmarks for their approaches or even semi-
automated processes. Evaluating more elaborated ex-
traction or matching concepts is possible as the modu-
lar tool chain allows replacing individual parts easily.
In our future work, we plan to evaluate more elab-
orated matching algorithms between data and require-
ments that consider heavily refined data models in
EAAs and to research how versions of EAAs affect
business processes in terms of ACRs.
ACKNOWLEDGEMENTS
The DFG (German Research Foundation) – project
number 432576552, HE8596/1-1 (FluidTrust) and the
KASTEL institutional funding supported this work.
REFERENCES
Abramov, J., Anson, O., Dahan, M., Shoval, P., and Sturm,
A. (2012). A methodology for integrating access con-
trol policies within database development. Comput.
Secur., 31(3):299–314.
Ahn, G. and Hu, H. (2007). Towards realizing a formal
RBAC model in real systems. In SACMAT’07, pages
215–224. ACM.
Alghathbar, K. and Wijesekera, D. (2003). Authuml:
A three-phased framework to analyze access control
specifications in use cases. In Proceedings of the 2003
ACM Workshop on Formal Methods in Security Engi-
neering, FMSE ’03, page 77–86. ACM.
Alpers, S., Pilipchuk, R., Oberweis, A., and Reussner, R.
(2019). The current state of the holistic privacy and
security modelling approach in business process and
software architecture modelling. Information Systems
Security and Privacy, pages 109–124.
AXELOS (2011). ITIL Edition 2011.
Boehm, B. and Basili, V. R. (2001). Software Defect Re-
duction Top 10 List. Computer, 34(1):135–137.
Busch, M. et al. (2014). Modeling security features of web
applications. In Eng. Secure Future Internet Services
and Sys., LNCS, pages 119–139. Springer.
D. Brucker, A. et al. (2012). SecureBPMN: Modeling and
enforcing access control requirements in business pro-
cesses. In SACMAT’12.
European Parliament (2016). Regulation (EU) 2016/679.
Official Journal of the European Union, 59:1–88.
Georg, G. et al. (2009). An aspect-oriented methodology for
designing secure applications. Information and Soft-
ware Technology, 51(5):846–864.
Giaglis, G. M. (2001). A taxonomy of business process
modeling and information systems modeling tech-
niques. Int J Flex Manuf Syst, 13(2):209–228.
Goudalo, W. and Seret, D. (2008). Toward the engineering
of security of information systems (esis): Uml and the
is confidentiality. In SECUREWARE, pages 248–256.
Heinrich, R. et al. (2017). Integrating business process sim-
ulation and information system simulation for perfor-
mance prediction. SoSyM, pages 1–21.
Heinrich, R., Rostami, K., and Reussner, R. (2016). The
CoCoME platform for collaborative empirical re-
search on information system evolution. Techni-
cal Report 2016,2; Karlsruhe Reports in Informatics,
Karlsruhe Institute of Technology.
J
¨
urjens, J. (2005). Secure systems development with UML.
Springer.
Kotusev, S. (2017). Critical questions in enterprise archi-
tecture research. IJEIS, 13(2):50–62.
Lodderstedt, T. et al. (2002). SecureUML: A uml-based
modeling language for model-driven security. In
UML’02, pages 426–441.
L
¨
ohe, J. et al. (2014). Overcoming implementation chal-
lenges in enterprise architecture management: a de-
sign theory for architecture-driven it management
(adrima). ISeB, 12(1):101–137.
Nguyen, P. H. et al. (2015). An extensive systematic review
on the Model-Driven Development of secure systems.
IST, 68:62–81.
Object Management Group (2011). Business process model
and notation (BPMN) v2.0.2.
Open Group (2018). Togaf standard, version 9.2.
Pilipchuk, R., Seifermann, S., Heinrich, R., and
Reussner, R. (2021). Evaluation data set.
https://doi.org/10.5281/zenodo.4700594.
R. Basili, V., Caldiera, G., and Rombach, D. (1994). The
goal question metric approach. Encyclopedia of Soft-
ware Engineering, 1.
Ramadan, Q. et al. (2017). From secure business pro-
cess modeling to design-level security verification. In
IEEE MODELS, pages 123–133.
Reussner, R. H. et al. (2016). Modeling and Simulating
Software Architectures – The Palladio Approach. MIT
Press.
Rodr
´
ıguez, A., Fern
´
andez-Medina, E., and Piattini, M.
(2007). A bpmn extension for the modeling of se-
curity requirements in business processes. IEICE -
Trans. Inf. Syst., E90-D(4):745–752.
Runeson, P. et al. (2012). Case Study Research in Software
Engineering: Guidelines and Examples. John Wiley
& Sons, Inc.
Salnitri, M. et al. (2015). From secure business process
models to secure artifact-centric specifications. In En-
terprise, Business-Process and Information Systems
Modeling, pages 246–262. Springer.
Seifermann, S., Heinrich, R., and Reussner, R. H. (2019).
Data-driven software architecture for analyzing confi-
dentiality. In ICSA’19, pages 1–10. IEEE.
Urbaczewski, L. et al. (2006). A comparison of enterprise
architecture frameworks. IIS, 7(2):18–23.
ICE-B 2021 - 18th International Conference on e-Business
24