By Topic

Secure Business Processes defined through a UML 2.0 extension

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Alfonso Rodriguez ; Dept. de Cienc. de la Comput. y Tecnol. de la Informacion, Univ. del Bio-Bio, Chilian ; Eduardo Fernandez-Medina ; Mario Piattini ; Juan Trujillo

Business processes (BP) are an important resource in enterprise performance and in maintaining competitiveness. In the last few years, languages used for BP representation have been improved and new notations have appeared. The importance of security in BP is widely accepted. However, the perspective of the business analyst in relation to security has hardly been dealt with. In this paper, we present an extension of the UML 2.0 Activity Diagram which allows us to specify security requirements in BP. We have used UML profile extensibility mechanisms composed of stereotypes, constraints and tagged values. We have also used the OCL to specify the constraints. We apply our proposal in a typical business process related to a patient admission in health-care institution.

Published in:

IEEE Latin America Transactions  (Volume:6 ,  Issue: 4 )