Skip to main content

Monitoring Security and Safety of Assets in Supply Chains

  • Conference paper
Future Security (Future Security 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 318))

Included in the following conference series:

Abstract

In the today’s world of the global economy supply chains become more and more complicated. Widely distributed supply chains open more possibilities for attacks on both IT as well physical level. The potential threats can span over multiple supply chains. For example, if the same truck is used to transport chemicals and then the same truck is used to transport food, a contamination threat arises that neither of the supply chains can detect when analysed independently. In this paper, we present a tool-supported framework that extends modelling and execution of supply chains processes with specification, execution and monitoring of the security and safety constraints that are used to protect supply chain assets. The tool allows to detect not only threats scoped to a single supply chain, but cross-cutting threats that can only be detected through analysis of the whole system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bobrik, R., Bauer, T., Reichert, M.: Proviado – Personalized and Configurable Visualizations of Business Processes. In: Bauknecht, K., Pröll, B., Werthner, H. (eds.) EC-Web 2006. LNCS, vol. 4082, pp. 61–71. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: Modeling and enforcing access control requirements in business processes. In: SACMAT. ACM Press (2012)

    Google Scholar 

  3. Herrmann, P., Herrmann, G.: Security requirement analysis of business processes 6, 305–335 (2006)

    Google Scholar 

  4. Kader, A.: Increasing food availability by reducing postharvest losses of fresh produce. In: V International Postharvest Symposium. International Society for Horticulutral Science (2005)

    Google Scholar 

  5. Lundqvist, J., de Fraiture, C., Molden, D.: Saving water: From field to fork – curbing losses and wastage in the food chain. In: SIWI Policy Brief (2008)

    Google Scholar 

  6. Mendling, J., Recker, J.: Towards systematic usage of labels and icons in business process models. In: 13th International Workshop on Exploring Modeling Methods for Systems Analysis and Design (2008)

    Google Scholar 

  7. Monakova, G., Brucker, A.D., Schaad, A.: Security and safety of assets in business processes. In: ACM Symposium on Applied Computing (SAC). ACM Press (2012)

    Google Scholar 

  8. Monakova, G., Leymann, F.: Workflow art: a framework for multidimensional workflow analysis. In: Enterprise Information Systems (2012)

    Google Scholar 

  9. Mülle, J., von Stackelberg, S., Böhm, K.: A security language for BPMN process models. Technical report, University Karlsruhe, KIT (2011)

    Google Scholar 

  10. Rinderle, S., Bobrik, R., Reichert, M., Bauer, T.: Business process visualization - use cases, challenges, solutions. In: ICEIS (3), pp. 204–211 (2006)

    Google Scholar 

  11. Rodríguez, A., Fernández-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst. E90-D, 745–752 (2007)

    Article  Google Scholar 

  12. Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture 55(4), 211–223 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Monakova, G., Severin, C., Brucker, A.D., Flegel, U., Schaad, A. (2012). Monitoring Security and Safety of Assets in Supply Chains. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33161-9_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33160-2

  • Online ISBN: 978-3-642-33161-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics