About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
EDOC 2019
Conference paper
Managing security objects and -processes using an extended BPM approach and -system
Abstract
One important use case for (business) process technology is process compliance. We propose that managing security objects such as cryptographic keys is an application domain that can greatly benefit from using process technology because of a critical compliance requirement. To this end, we present a BPMN extension and a design of a support system for key management processes. Both were driven by a case study on a distributed application using a standard hierarchical public key infrastructure, which we also present. Our prototypical implementation of the support system shows that process compliance for security object management processes can be substantially supported with moderate effort by extending the standard process technology.