Monitoring Security and Safety of Assets in Supply Chains

  • Ganna Monakova
  • Cristina Severin
  • Achim D. Brucker
  • Ulrich Flegel
  • Andreas Schaad
Part of the Communications in Computer and Information Science book series (CCIS, volume 318)


In the today’s world of the global economy supply chains become more and more complicated. Widely distributed supply chains open more possibilities for attacks on both IT as well physical level. The potential threats can span over multiple supply chains. For example, if the same truck is used to transport chemicals and then the same truck is used to transport food, a contamination threat arises that neither of the supply chains can detect when analysed independently. In this paper, we present a tool-supported framework that extends modelling and execution of supply chains processes with specification, execution and monitoring of the security and safety constraints that are used to protect supply chain assets. The tool allows to detect not only threats scoped to a single supply chain, but cross-cutting threats that can only be detected through analysis of the whole system.


Supply Chain Security Monitoring Resource modelling 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bobrik, R., Bauer, T., Reichert, M.: Proviado – Personalized and Configurable Visualizations of Business Processes. In: Bauknecht, K., Pröll, B., Werthner, H. (eds.) EC-Web 2006. LNCS, vol. 4082, pp. 61–71. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: Modeling and enforcing access control requirements in business processes. In: SACMAT. ACM Press (2012)Google Scholar
  3. 3.
    Herrmann, P., Herrmann, G.: Security requirement analysis of business processes 6, 305–335 (2006)Google Scholar
  4. 4.
    Kader, A.: Increasing food availability by reducing postharvest losses of fresh produce. In: V International Postharvest Symposium. International Society for Horticulutral Science (2005)Google Scholar
  5. 5.
    Lundqvist, J., de Fraiture, C., Molden, D.: Saving water: From field to fork – curbing losses and wastage in the food chain. In: SIWI Policy Brief (2008)Google Scholar
  6. 6.
    Mendling, J., Recker, J.: Towards systematic usage of labels and icons in business process models. In: 13th International Workshop on Exploring Modeling Methods for Systems Analysis and Design (2008)Google Scholar
  7. 7.
    Monakova, G., Brucker, A.D., Schaad, A.: Security and safety of assets in business processes. In: ACM Symposium on Applied Computing (SAC). ACM Press (2012)Google Scholar
  8. 8.
    Monakova, G., Leymann, F.: Workflow art: a framework for multidimensional workflow analysis. In: Enterprise Information Systems (2012)Google Scholar
  9. 9.
    Mülle, J., von Stackelberg, S., Böhm, K.: A security language for BPMN process models. Technical report, University Karlsruhe, KIT (2011)Google Scholar
  10. 10.
    Rinderle, S., Bobrik, R., Reichert, M., Bauer, T.: Business process visualization - use cases, challenges, solutions. In: ICEIS (3), pp. 204–211 (2006)Google Scholar
  11. 11.
    Rodríguez, A., Fernández-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst. E90-D, 745–752 (2007)CrossRefGoogle Scholar
  12. 12.
    Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture 55(4), 211–223 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ganna Monakova
    • 1
  • Cristina Severin
    • 2
  • Achim D. Brucker
    • 1
  • Ulrich Flegel
    • 3
  • Andreas Schaad
    • 1
  1. 1.SAP ResearchKarlsruheGermany
  2. 2.esciris gmbhHolzgerlingenGermany
  3. 3.HFT StuttgartStuttgartGermany

Personalised recommendations