SCBP 2015 - 2015 Workshop on Security and Compliance in Business Processes
Topics/Call fo Papers
Despite the growing demand for business processes that comply with security policies, security and privacy incidents caused by erroneous workflow specifications are regrettably common. This is, in part, because business process management and security are seldom addressed together, thereby hindering the development of trustworthy and security-compliant business processes. The Workshop on Security and Compliance in Business Processes (SCBP’15) seeks to bring together researchers and practitioners interested in the management and modelling of secure and compliant business processes in process-aware information systems. In particular, SCBP’15 encourages innovative methods for workflow security modelling, security compliance, audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues.
The goal of SCBP’15 is to obtain a deeper understanding of a rapidly maturing, yet still largely under-investigated field of business process security, audit and control, including both thorough security requirements formalization, secure process modelling, and mechanisms for verification, monitoring and auditing. Besides the “technical” intent to substantially advance the current state of the art, SCBP’15 aims to locate active research areas in academia and industry; get a snapshot of the current approaches and existing tool-support; encourage approaches and techniques that combine formal foundations with industrial applicability; and identify new research directions and challenges. In tackling these questions we hope to make a substantial contribution to reliable and secure business process management.
In particular, SCBP’15 encourages innovative methods for workflow security modelling, security audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues.
Topics of Interest:
Alignment
Authorization
Accountability
Audit reduction
Business provenance
Case studies
Conformance/compliance checking
Continuous audit
Cost-benefit analysis
Data-centric process mining
Economics of audit
Experience reports
Formal reasoning
Fraud detection
Information flow control
Meta-models for analysis
Operational decision support
Privacy-aware process discovery
Requirements elicitation
Requirements formalization
Risk Measurement
Runtime verification and monitoring
Security modelling
Security testing
Trace clustering
Usage control
Workflow forensics
Workflow simulation
The goal of SCBP’15 is to obtain a deeper understanding of a rapidly maturing, yet still largely under-investigated field of business process security, audit and control, including both thorough security requirements formalization, secure process modelling, and mechanisms for verification, monitoring and auditing. Besides the “technical” intent to substantially advance the current state of the art, SCBP’15 aims to locate active research areas in academia and industry; get a snapshot of the current approaches and existing tool-support; encourage approaches and techniques that combine formal foundations with industrial applicability; and identify new research directions and challenges. In tackling these questions we hope to make a substantial contribution to reliable and secure business process management.
In particular, SCBP’15 encourages innovative methods for workflow security modelling, security audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues.
Topics of Interest:
Alignment
Authorization
Accountability
Audit reduction
Business provenance
Case studies
Conformance/compliance checking
Continuous audit
Cost-benefit analysis
Data-centric process mining
Economics of audit
Experience reports
Formal reasoning
Fraud detection
Information flow control
Meta-models for analysis
Operational decision support
Privacy-aware process discovery
Requirements elicitation
Requirements formalization
Risk Measurement
Runtime verification and monitoring
Security modelling
Security testing
Trace clustering
Usage control
Workflow forensics
Workflow simulation
Other CFPs
Last modified: 2015-02-18 23:02:20