Modelling quality of protection in outsourced business processes

F. Massacci, A. Yautsiukhin

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather than to assess the level of assurance of the whole process that is currently deployed. The main contributions of the paper is an approach for aggregating security properties of individual tasks of a complex business process in order to receive the level of assurance provided by the whole process. The approach takes into account the fact that some tasks of a business process may be outsourced and thus account for not very reliable partners. The approach chooses the concrete business process offering the highest assurance among several possible design alternatives by building an optimal hyperpath traversing the business process. © 2007 IEEE.
Original languageEnglish
Title of host publicationProceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security
Pages247-252
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event3rd Internationl Symposium on Information Assurance and Security, IAS 2007 - , United Kingdom
Duration: 20 Aug 200731 Aug 2007

Publication series

NameProceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security

Conference

Conference3rd Internationl Symposium on Information Assurance and Security, IAS 2007
Country/TerritoryUnited Kingdom
Period20/08/0731/08/07

Fingerprint

Dive into the research topics of 'Modelling quality of protection in outsourced business processes'. Together they form a unique fingerprint.

Cite this