• DocumentCode
    589047
  • Title

    Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems

  • Author

    Atkinson, Colin ; Barth, F. ; Gerbig, Ralph ; Freiling, F. ; Schinzel, S. ; Hadasch, F. ; Maedche, Alexander ; Muller, Benjamin

  • Author_Institution
    Dept. of Software Eng., Univ. of Mannheim, Mannheim, Germany
  • fYear
    2012
  • fDate
    10-14 Sept. 2012
  • Firstpage
    11
  • Lastpage
    18
  • Abstract
    Research in enterprise system security has largely focused on the development of theoretical models capable of demonstrating mathematically that they possess desired security properties. However, recent results confirm that many of these models cannot be applied in practice because of the unpredictability of human participants´ behavior in business processes. Moreover, while malicious attacks remain a significant problem, the majority of user-caused information leaks in Enterprise Systems are unintentional (or have many unintentional components) and could potentially be prohibited if explicitly recognized and appropriately modeled. In this paper we argue that approaches for achieving information flow security in enterprises need to combine process and policy understandability with usability of the enforcement mechanisms. We present a modeling approach that allows security policies to be formulated in such a way that (1) they are aligned to the business processes executed in an enterprise, (2) are understandable by all relevant stakeholders, and (3) can be semi-automatically transformed into run-time enforcement mechanisms.
  • Keywords
    business data processing; security of data; business process execution; enforcement mechanism usability; enterprise system security; human participant behavior unpredictability; information flow security; malicious attacks; modeling approach; policy understandability; process understandability; run-time enforcement mechanisms; security policies; theoretical model development; unintended human-caused information flows; user-caused information leaks; Companies; Humans; Information security; Interviews; Information security; Security Property; User Behaviour;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2012 IEEE 16th International
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4673-5005-1
  • Type

    conf

  • DOI
    10.1109/EDOCW.2012.12
  • Filename
    6406247