BPM and Cloud Integration: A New Driver for Research in Security in Business Processes

By Achim D. Brucker.

Enterprise systems in general and process aware systems in particular are storing and processing the most critical assets of a company. To protect these assets, such systems need to implement a multitude of security properties. Moreover, such systems need often to comply to various compliance regulations.

In this talk, we briefly discuss challenges of implementing large-scale systems based on workflow-management in general and, in particular, the in the context of cloud based systems. We will put a particular focus on security requirements and discuss the gab between the ideal world of process-aware information systems and the real world. We conclude our presentation by discussing several research challenges in the area of verifiable secure process aware information systems.

Please cite this work as follows:
A. D. Brucker, “BPM and cloud integration: A new driver for research in security in business processes,” presented at the Guest lecture: Konzepte und anwendung von workflowsystemen, karlsruhe institute of technology (KIT), Karlsruhe, Germany, Feb. 13, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker-bpm-cloud-2014/

BibTeX
@Unpublished{ talk:brucker:bpm-cloud:2014,
  date              = {2014-02-13},
  title             = {BPM and Cloud Integration: A New Driver for Research in
                       Security in Business Processes},
  author            = {Achim D. Brucker},
  venue             = {Karlsruhe, Germany},
  slideshare        = {37109900},
  slideshare_width  = {476},
  slideshare_height = {400},
  eventtitle        = {Guest Lecture: Konzepte und Anwendung von Workflowsystemen,
                       Karlsruhe Institute of Technology (KIT)},
  abstract          = {Enterprise systems in general and process aware systems in
                       particular are storing and processing the most critical assets
                       of a company. To protect these assets, such systems need to
                       implement a multitude of security properties. Moreover, such
                       systems need often to comply to various compliance
                       regulations.
                       
                       In this talk, we briefly discuss challenges of implementing
                       large-scale systems based on workflow-management in general
                       and, in particular, the in the context of cloud based systems.
                       We will put a particular focus on security requirements and
                       discuss the gab between the ideal world of process-aware
                       information systems and the real world. We conclude our
                       presentation by discussing several research challenges in the
                       area of verifiable secure process aware information systems.},
  note              = {Author copy: \url{https://logicalhacking.com/publications/talk-brucker-bpm-cloud-2014/}},
  pdf               = {https://logicalhacking.com/publications/talk-brucker-bpm-cloud-2014/talk-brucker-bpm-cloud-2014.pdf},
}