Skip to main content

Subjective Security and Safety – S-BPM as a Base for the Description of Security and Safety Objectives

  • Conference paper
S-BPM ONE - Education and Industrial Developments (S-BPM ONE 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 284))

  • 619 Accesses

Abstract

Security and privacy in computer systems is a major issue and it is hard to find a good compromise between necessary protection and desirable open access to the internet. We propose a subject-oriented approach to computer security analysis in order to comply with the users’ needs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bettendorf, J.: Dienstordnung und Büro. In: Brambring, G., Jerschke, H.-U. (eds.) Beck’sches Notar-Handbuch, pp. 1665–1711. Beck Juristischer Verlag, München (2009)

    Google Scholar 

  2. Armbrüster, C., Preuß, N., Renner, T.: Beurkundungsgesetz und Dienstordnung für Notarinnen und Notare: Kommentar. Gruyter (2008)

    Google Scholar 

  3. Wirtz, B.W.: E-Government: Grundlagen, Instrumente, Strategien. Gabler Verlag (2010)

    Google Scholar 

  4. Dirndorfer, M.: Konzeption eines Referenzmodells für die notarielle Kommunikation. Unpublished master thesis (2011)

    Google Scholar 

  5. Eckert, C.: IT-Sicherheit: Konzepte - Verfahren - Protokolle. Oldenbourg Wissenschaftsverlag (2009)

    Google Scholar 

  6. Fleischmann, A.: What Is S-BPM? In: Buchwald, H., Fleischmann, A., Seese, D., Stary, C. (eds.) S-BPM ONE 2009. CCIS, vol. 85, pp. 85–106. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Johansson, J.M.: Sicherheit auf dem Prüfstand Subjekte und Sicherheitsprinzipale, http://technet.microsoft.com/de-de/query/dd297621

  8. Kersten, H., Klett, G.: Der It Security Manager: Expertenwissen für jeden It Security Manager- von namhaften Autoren praxisnah vermittelt. Vieweg + Teubner (2008)

    Google Scholar 

  9. Bedner, M., Ackermann, T.: Schutzziele der IT-Sicherheit. Datenschutz und Datensicherheit, 323–328

    Google Scholar 

  10. Schumacher, M.: Security patterns: integrating security and systems engineering. John Wiley & Sons (2006)

    Google Scholar 

  11. Federrath, H., Pfitzmann, A.: Gliederung und Systematisierung vonSchutzzielen in IT-Systemen. Datenschutz und Datensicherheit, 704–710 (2000)

    Google Scholar 

  12. Dirndorfer, M., Handy, B.: Internalpaper on Describing and Documenting IT Security Objectives in the Notarial Context (2011)

    Google Scholar 

  13. Fleischmann, A., Stary, C.: Whom to talk to? A stakeholder perspective on business process development. Universal Access in the Information Society (2011)

    Google Scholar 

  14. Heinrich, R., Kappe, A., Paech: Modeling Quality Information within Business Process Models. Tagungsband 4. Workshop zur Software-Qualitätsmodellierung und -bewertung, pp. 4–13. Institut für Informatik der TU München (2011)

    Google Scholar 

  15. Jensen, M., Feja, S.: A Security Modeling Approach for Web-Service-based Business Processes. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 340–347 (2009)

    Google Scholar 

  16. Monakova, G., Brucker, A.D., Schaad, A.: Security and Safety of Assets in Business Processes. In: ACM 27th Symposium on Applied Computing. ACM Press, New York (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dirndorfer, M., Handy, B., Schneeberger, J., Fischer, H. (2012). Subjective Security and Safety – S-BPM as a Base for the Description of Security and Safety Objectives. In: Oppl, S., Fleischmann, A. (eds) S-BPM ONE - Education and Industrial Developments. S-BPM ONE 2012. Communications in Computer and Information Science, vol 284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29294-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29294-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29293-4

  • Online ISBN: 978-3-642-29294-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics