<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>SREBP: Security Requirement Elicitation from Business Processes</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Computer Science, University of Tartu J. Liivi 2</institution>
          ,
          <addr-line>50409 Tartu</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        In today's fast and dynamic environment, business processes play a
crucial role for enterprises to gain competitiveness. The traditional approaches in
business process domain tend to focus on business processes execution and their
improvement. At the same time business process modelling maturity towards
expressing the enterprise's organisational perspective (business values and
stakeholders interests) proves huge potential to perform early security analysis in
capturing the enterprise' security needs. The phenomenon has been over sighted
in business processes and several attempts made to engage the relatively
matured security requirements engineering in business processes, either focus on
the graphical representation of security aspects in business process models or
enforces the security mechanisms or both. However, the security requirement
elicitation methods contain a number of limitations [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Firstly, security
requirements are speci ed in terms of security architectural design (i.e., security control)
and, thus, miss the rationale about the trade-o s of the security decision.
Secondly, requirement elicitation is either missing or haphazard. This results in a
miss of critical security requirements. And nally, due to the dynamic and
complicated nature of business processes the studies only address varying aspects
(i.e., authorization, access control, separation of duty or binding of duty) but
not the overall security of business processes. These limitations can overcome
by eliciting security objectives from the organizational business processes and
transform them to security requirements in operational business processes where
technology supports the business processes execution.
      </p>
      <p>
        We propose a two-stage method { Security Requirement Elicitation from
Business Processes (SREBP) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], illustrated in Fig. 1. The method has two-fold
advantage: rstly, the security objectives are aligned with the business as they
are de ned from business processes. They are translated to security requirements
that characterise how to execute the business process securely. Secondly, the
method has adapted the concepts and activities from existing mature domain
of security requirement engineering. This enables an early security analysis and
helps elicit security requirements from business processes.
      </p>
      <p>
        The rst stage starts with the analysis of the value chain. It helps (i )
understanding of organisational processes and, thus, (ii ) determining the business
assets. Next, we de ne the security objectives that must protect these assets
against security risks. At the second stage, the information system is divided in
to ve contextual areas [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]: access control, communication channel, input
interface, business service and data store. We de ne a set of activities to perform
the security assessment with in each contextual area. These activities analyse
the business context against an available threat catalogue. The catalogue helps
identify the potential vulnerabilities in business processes. Following the domain
model of the information system security risk management [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], we elicit the
security requirements within each contextual area.
The contextual area of Access control is related to inter- and
intra-organisational concerns and speci es the access control policy where roles (individuals,
applications or their groups) perform operations and access business asset in the
system, to change the state of protected asset. In case of Communication channel,
one considers how data are exchanged between business partners and system.
Here, data need to be protected when they are transmitted over the (untrusted)
communication channel. In case of Input interfaces, one analyses how input data
are treated before accepting them for processing. Here, we identify the input
interfaces of the system that receives data from business partners. In case of
Business services, one needs to protect the enterprise's services, for their
availability. Here, we secure the server infrastructure supports the business services.
Finally, the Data store contextual area concerns data protection when storing
or/and retrieving to/from the data store, in case, if the threat agent is capable
of accessing the data les directly.
      </p>
      <p>The strength of the SREBP method lies in its general description of security
goals, the targeted and systematic analysis of the system contextual areas. In
comparison to the other works where the focus is, in majority, placed on
representing security requirements, our proposal suggests a novel approach to elicit
these requirements and de ne them as the business rules. The initial validation
has shown that the method should be improved with new security risk-oriented
patterns. We also plan to extent the method with the requirements prioritisation
to support the trade-o analysis.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ahmed</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matulevicius</surname>
          </string-name>
          , R.:
          <article-title>A Method for Eliciting Security Requirements from the Business Process Models</article-title>
          . In: CAiSE forum (
          <year>2014</year>
          ), accepted
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ahmed</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matulevicius</surname>
          </string-name>
          , R.:
          <article-title>Securing Business Processes using Security Riskoriented Patterns</article-title>
          .
          <source>Computer Standards &amp; Interfaces</source>
          <volume>36</volume>
          (
          <issue>4</issue>
          ),
          <volume>723</volume>
          {
          <fpage>733</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Dubois</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heymans</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mayer</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matulevicius</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A Systematic Approach to De ne the Domain of Information System Security Risk Management</article-title>
          .
          <source>In: Intentional Perspectives on Information Systems Eng</source>
          ., pp.
          <volume>289</volume>
          {
          <fpage>306</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. T ndel,
          <string-name>
            <given-names>I.A.</given-names>
            ,
            <surname>Jaatun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.G.</given-names>
            ,
            <surname>Meland</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.H.</surname>
          </string-name>
          :
          <article-title>Security Requirements for the Rest of Us: A Survey</article-title>
          .
          <source>IEEE Softw</source>
          .
          <volume>25</volume>
          (
          <issue>1</issue>
          ),
          <volume>20</volume>
          {
          <fpage>27</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>