語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Obstructions in security-aware busin...
~
Holderer, Julius.
FindBook
Google Book
Amazon
博客來
Obstructions in security-aware business processes = analysis, detection, and handling /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Obstructions in security-aware business processes/ by Julius Holderer.
其他題名:
analysis, detection, and handling /
作者:
Holderer, Julius.
出版者:
Wiesbaden :Springer Fachmedien Wiesbaden : : 2022.,
面頁冊數:
xxi, 341 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Why the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process-Aware Information Systems -- Obstruction Modeling -- OLive-M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography.
Contained By:
Springer Nature eBook
標題:
Business - Data processing -
電子資源:
https://doi.org/10.1007/978-3-658-38154-7
ISBN:
9783658381547
Obstructions in security-aware business processes = analysis, detection, and handling /
Holderer, Julius.
Obstructions in security-aware business processes
analysis, detection, and handling /[electronic resource] :by Julius Holderer. - Wiesbaden :Springer Fachmedien Wiesbaden :2022. - xxi, 341 p. :ill. (chiefly color), digital ;24 cm.
Why the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process-Aware Information Systems -- Obstruction Modeling -- OLive-M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography.
Open access.
This Open Access. book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. About the author Julius Holderer is a researcher in the area of security and compliance in business processes at the Faculty of Engineering of the University of Freiburg (Germany). He is interested in information, IT, and cyber security, as well as policy and process modeling, process automation and mining.
ISBN: 9783658381547
Standard No.: 10.1007/978-3-658-38154-7doiSubjects--Topical Terms:
812720
Business
--Data processing
LC Class. No.: HF5548.2 / .H65 2022
Dewey Class. No.: 658.05
Obstructions in security-aware business processes = analysis, detection, and handling /
LDR
:03020nmm a2200361 a 4500
001
2302462
003
DE-He213
005
20220723202309.0
006
m d
007
cr nn 008maaau
008
230409s2022 gw s 0 eng d
020
$a
9783658381547
$q
(electronic bk.)
020
$a
9783658381530
$q
(paper)
024
7
$a
10.1007/978-3-658-38154-7
$2
doi
035
$a
978-3-658-38154-7
040
$a
GP
$c
GP
041
0
$a
eng
$b
ger
050
4
$a
HF5548.2
$b
.H65 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
658.05
$2
23
090
$a
HF5548.2
$b
.H727 2022
100
1
$a
Holderer, Julius.
$3
3602802
245
1 0
$a
Obstructions in security-aware business processes
$h
[electronic resource] :
$b
analysis, detection, and handling /
$c
by Julius Holderer.
260
$a
Wiesbaden :
$b
Springer Fachmedien Wiesbaden :
$b
Imprint: Springer Vieweg,
$c
2022.
300
$a
xxi, 341 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
505
0
$a
Why the Automation of Regulation Can Obstruct Business Processes -- Security-Related Obstructability in Process-Aware Information Systems -- Obstruction Modeling -- OLive-M: A SecANet Use Case for Model-Based Obstruction Solving -- OLive-L: SecANet Use Case for Log-Based Obstruction Solving -- Towards Intelligent Security- and Process-Aware Information Systems -- Bibliography.
506
$a
Open access.
520
$a
This Open Access. book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, as well as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software. About the author Julius Holderer is a researcher in the area of security and compliance in business processes at the Faculty of Engineering of the University of Freiburg (Germany). He is interested in information, IT, and cyber security, as well as policy and process modeling, process automation and mining.
650
0
$a
Business
$x
Data processing
$x
Security measures.
$3
812720
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Privacy.
$3
528582
650
2 4
$a
Security Services.
$3
3382346
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-658-38154-7
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9444011
電子資源
11.線上閱覽_V
電子書
EB HF5548.2 .H65 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入