Abstract
In the today’s world of the global economy supply chains become more and more complicated. Widely distributed supply chains open more possibilities for attacks on both IT as well physical level. The potential threats can span over multiple supply chains. For example, if the same truck is used to transport chemicals and then the same truck is used to transport food, a contamination threat arises that neither of the supply chains can detect when analysed independently. In this paper, we present a tool-supported framework that extends modelling and execution of supply chains processes with specification, execution and monitoring of the security and safety constraints that are used to protect supply chain assets. The tool allows to detect not only threats scoped to a single supply chain, but cross-cutting threats that can only be detected through analysis of the whole system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bobrik, R., Bauer, T., Reichert, M.: Proviado – Personalized and Configurable Visualizations of Business Processes. In: Bauknecht, K., Pröll, B., Werthner, H. (eds.) EC-Web 2006. LNCS, vol. 4082, pp. 61–71. Springer, Heidelberg (2006)
Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: Modeling and enforcing access control requirements in business processes. In: SACMAT. ACM Press (2012)
Herrmann, P., Herrmann, G.: Security requirement analysis of business processes 6, 305–335 (2006)
Kader, A.: Increasing food availability by reducing postharvest losses of fresh produce. In: V International Postharvest Symposium. International Society for Horticulutral Science (2005)
Lundqvist, J., de Fraiture, C., Molden, D.: Saving water: From field to fork – curbing losses and wastage in the food chain. In: SIWI Policy Brief (2008)
Mendling, J., Recker, J.: Towards systematic usage of labels and icons in business process models. In: 13th International Workshop on Exploring Modeling Methods for Systems Analysis and Design (2008)
Monakova, G., Brucker, A.D., Schaad, A.: Security and safety of assets in business processes. In: ACM Symposium on Applied Computing (SAC). ACM Press (2012)
Monakova, G., Leymann, F.: Workflow art: a framework for multidimensional workflow analysis. In: Enterprise Information Systems (2012)
Mülle, J., von Stackelberg, S., Böhm, K.: A security language for BPMN process models. Technical report, University Karlsruhe, KIT (2011)
Rinderle, S., Bobrik, R., Reichert, M., Bauer, T.: Business process visualization - use cases, challenges, solutions. In: ICEIS (3), pp. 204–211 (2006)
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst. E90-D, 745–752 (2007)
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture 55(4), 211–223 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Monakova, G., Severin, C., Brucker, A.D., Flegel, U., Schaad, A. (2012). Monitoring Security and Safety of Assets in Supply Chains. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-33161-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33160-2
Online ISBN: 978-3-642-33161-9
eBook Packages: Computer ScienceComputer Science (R0)