Title :
Representing Threats in BPMN 2.0
Author :
Meland, Per Håkon ; Gjære, Erlend Andreas
Author_Institution :
Software Eng., Safety & Security, SINTEF ICT, Trondheim, Norway
Abstract :
The Business Process Modeling Notation (BPMN) has become a broadly accepted standard for process modeling, but is mostly being used to express the normal execution flow of business processes. In some situations there is also a need to express threats and unwanted incidents on that same abstraction level, for example to show how deviations from normal process flow should be handled. Enriching BPMN with threat information enables a process-centric threat modeling approach that complements risk assessment and attack scenarios. Though there has been a substantial amount of work enhancing BPMN 1.x with security related information, the opportunities provided by version 2.0 have not received a lot of attention in the security community. This paper shows several options and the benefit of representing threats in BPMN 2.0 for design-time specification and runtime execution of composite services with dynamic behavior. Our goal is to avoid downtime and preserve the overall security and trustworthiness of the composite service in an ever-changing Internet of Services. We have included examples showing the use of error events, escalation events and text annotations for process, collaboration, choreography and conversion diagrams.
Keywords :
Internet; business data processing; risk management; security of data; trusted computing; BPMN 2.0; Internet; abstraction level; attack scenarios; business process modeling notation; composite service; design-time specification; error events; escalation events; execution flow; process flow; process-centric threat modeling approach; risk assessment; runtime execution; security community; security related information; text annotations; trustworthiness; Collaboration; Communities; Risk management; Runtime; Security; Standards; BPMN; SOA; business process modeling; composite services; dynamic behavior; security; threat; trustworthiness;
Conference_Titel :
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
Conference_Location :
Prague
Print_ISBN :
978-1-4673-2244-7
DOI :
10.1109/ARES.2012.13