MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES

S. Nachtigal, C. J. Mitchell

2006

Abstract

Organisations (enterprises, businesses, government institutions, etc.) have changed their way of doing business from a traditional approach to embrace e-business processes. This change makes the perimeter security approach inappropriate for such organisations. The well-known and widely used security mechanisms, including cryptography-based tools and techniques, cannot provide a sufficient level of security without being a part of a comprehensive organisational approach/philosophy. This approach must be different from the current dominant approach, i.e. perimeter security, and must focus on different organisational components. In this paper we suggest a process security approach, and describe ongoing research with the aim of developing an e-business security model based on this new, process security, approach.

Download


Paper Citation


in Harvard Style

Nachtigal S. and J. Mitchell C. (2006). MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 459-464. DOI: 10.5220/0002103404590464

in Bibtex Style

@conference{secrypt06,
author={S. Nachtigal and C. J. Mitchell},
title={MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={459-464},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002103404590464},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES
SN - 978-972-8865-63-4
AU - Nachtigal S.
AU - J. Mitchell C.
PY - 2006
SP - 459
EP - 464
DO - 10.5220/0002103404590464