The 16th International Conference on Availability, Re-
liability and Security, ARES 2021. ACM.
Dijkman, R. M., Dumas, M., and Ouyang, C. (2008).
Semantics and analysis of business process mod-
els in bpmn. Information and Software technology,
50(12):1281–1294.
Elyas, M., Ahmad, A., Maynard, S. B., and Lonie, A.
(2015). Digital forensic readiness: Expert perspec-
tives on a theoretical framework. Computers & Secu-
rity, 52:70–89.
Geismann, J. and Bodden, E. (2020). A systematic litera-
ture review of model-driven security engineering for
cyber–physical systems. Journal of Systems and Soft-
ware, 169:110697.
Grispos, G., García-Galán, J., Pasquale, L., and Nuseibeh,
B. (2017a). Are you ready? towards the engineer-
ing of forensic-ready systems. In 2017 11th Interna-
tional Conference on Research Challenges in Infor-
mation Science (RCIS), pages 328–333.
Grispos, G., Glisson, W. B., and Choo, K.-K. R. (2017b).
Medical cyber-physical systems development: A
forensics-driven approach. In 2017 IEEE/ACM In-
ternational Conference on Connected Health: Ap-
plications, Systems and Engineering Technologies
(CHASE), pages 108–113.
Grobler, C. P. and Louwrens, C. P. (2007). Digital foren-
sic readiness as a component of information security
best practice. In New Approaches for Security, Pri-
vacy and Trust in Complex Environments, pages 13–
24. Springer.
Harel, D. and Rumpe, B. (2004). Meaningful modeling:
what’s the semantics of "semantics"? Computer,
37(10):64–72.
Henley, J. (2019). Denmark frees 32 inmates over flaws in
phone geolocation evidence. The Guardian.
Hepp, T., Schoenhals, A., Gondek, C., and Gipp, B. (2018).
Originstamp: A blockchain-backed system for decen-
tralized trusted timestamping. it - Information Tech-
nology, 60(5-6):273–281.
Houhou, S., Baarir, S., Poizat, P., and Quéinnec, P. (2019).
A first-order logic semantics for communication-
parametric bpmn collaborations. In Business Process
Management, pages 52–68, Cham. Springer.
Kävrestad, J. (2018). Fundamentals of Digital Forensics.
Springer.
Kruchten, P. (1995). The 4+1 view model of architecture.
IEEE Software, 12(6):42–50.
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K.,
and Njilla, L. (2017). Provchain: A blockchain-
based data provenance architecture in cloud environ-
ment with enhanced privacy and availability. In 2017
17th IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing (CCGRID), pages 468–
477.
Matulevi
ˇ
cius, R. (2017). Fundamentals of secure system
modelling. Springer.
McKemmish, R. (2008). When is digital evidence foren-
sically sound? In Advances in Digital Forensics IV,
pages 3–15. Springer.
Mülle, J., Stackelberg, S. v., and Böhm, K. (2011). A se-
curity language for bpmn process models. Technical
Report 9, Karlsruher Institut für Technologie.
Nwaokolo, A. O. (2020). A comparison of privacy enhanc-
ing technologies in internet of vehicle systems. Mas-
ter’s thesis, University of Tartu.
OMG (2010). Business process model and notation. https:
//www.omg.org/spec/BPMN/2.0/.
´
Cosi
´
c, J. and Ba
ˇ
ca, M. (2010). (im)proving chain of custody
and digital evidence integrity with time stamp. In The
33rd International Convention MIPRO, pages 1226–
1230.
Pasquale, L., Alrajeh, D., Peersman, C., Tun, T., Nuseibeh,
B., and Rashid, A. (2018). Towards forensic-ready
software systems. In Proceedings of the 40th Inter-
national Conference on Software Engineering: New
Ideas and Emerging Results, ICSE-NIER ’18, page
9–12. ACM.
Pullonen, P., Matulevi
ˇ
cius, R., and Bogdanov, D. (2017).
Pe-bpmn: Privacy-enhanced business process model
and notation. In Business Process Management, pages
40–56. Springer.
Pullonen, P., Tom, J., Matulevi
ˇ
cius, R., and Toots, A.
(2019). Privacy-enhanced bpmn: Enabling data pri-
vacy analysis in business processes models. Software
and Systems Modeling, 18(6):3235–3264.
Rivera-Ortiz, F. and Pasquale, L. (2020). Automated mod-
elling of security incidents to represent logging re-
quirements in software systems. In Proceedings of the
15th International Conference on Availability, Relia-
bility and Security, ARES ’20. ACM.
Rodríguez, A., Fernández-Medina, E., and Piattini, M.
(2007). A bpmn extension for the modeling of se-
curity requirements in business processes. IEICE -
Trans. Inf. Syst., E90-D(4):745–752.
Rowlingson, R. (2004). A ten step process for forensic re-
adiness. International Journal of Digital Evidence, 2.
Sachowski, J. (2016). Implementing Digital Forensic
Readiness. Syngress.
Salnitri, M., Dalpiaz, F., and Giorgini, P. (2014). Modeling
and verifying security policies in business processes.
In Enterprise, Business-Process and Information Sys-
tems Modeling, pages 200–214. Springer.
Silver, B. (2011). BPMN Method and Style, with BPMN
Implementer’s Guide: A structured approach for
business process modeling and implementation using
BPMN 2.0. Cody-Cassidy Press Aptos, CA, USA.
Studiawan, H., Sohel, F., and Payne, C. (2019). A survey on
forensic investigation of operating system logs. Digi-
tal Investigation, 29:1–20.
Tan, J. (2001). Forensic readiness. Technical report,
@stake, Inc.
Van den Berghe, A., Scandariato, R., Yskout, K., and
Joosen, W. (2017). Design notations for secure soft-
ware: a systematic literature review. Software & Sys-
tems Modeling, 16(3):809–831.
Weilbach, W. T. and Motara, Y. M. (2019). Applying
distributed ledger technology to digital evidence in-
tegrity. SAIEE Africa Research Journal, 110(2):77–
93.
ENASE 2022 - 17th International Conference on Evaluation of Novel Approaches to Software Engineering
106