
By Achim D. Brucker.
Enterprise systems in general and process aware systems in particular are storing and processing the most critical assets of a company. To protect these assets, such systems need to implement a multitude of security properties. Moreover, such systems need often to comply to various compliance regulations.
In this talk, we briefly discuss challenges of implementing large-scale systems based on workflow-management in general and, in particular, the in the context of cloud based systems. We will put a particular focus on security requirements and discuss the gab between the ideal world of process-aware information systems and the real world. We conclude our presentation by discussing several research challenges in the area of verifiable secure process aware information systems.
Please cite this work as follows: A. D. Brucker, “BPM and cloud integration: A new driver for research in security in business processes,” presented at the Guest lecture: Konzepte und anwendung von workflowsystemen, karlsruhe institute of technology (KIT), Karlsruhe, Germany, Feb. 13, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker-bpm-cloud-2014/
@Unpublished{ talk:brucker:bpm-cloud:2014,
date = {2014-02-13},
title = {BPM and Cloud Integration: A New Driver for Research in
Security in Business Processes},author = {Achim D. Brucker},
venue = {Karlsruhe, Germany},
slideshare = {37109900},
slideshare_width = {476},
slideshare_height = {400},
eventtitle = {Guest Lecture: Konzepte und Anwendung von Workflowsystemen,
Karlsruhe Institute of Technology (KIT)},abstract = {Enterprise systems in general and process aware systems in
particular are storing and processing the most critical assets
of a company. To protect these assets, such systems need to
implement a multitude of security properties. Moreover, such
systems need often to comply to various compliance
regulations.
In this talk, we briefly discuss challenges of implementing
large-scale systems based on workflow-management in general
and, in particular, the in the context of cloud based systems.
We will put a particular focus on security requirements and
discuss the gab between the ideal world of process-aware
information systems and the real world. We conclude our
presentation by discussing several research challenges in the
area of verifiable secure process aware information systems.},note = {Author copy: \url{https://logicalhacking.com/publications/talk-brucker-bpm-cloud-2014/}},
pdf = {https://logicalhacking.com/publications/talk-brucker-bpm-cloud-2014/talk-brucker-bpm-cloud-2014.pdf},
}