posted by user: rma || 1578 views || tracked by 4 users: [display]

SCBP 2015 : Workshop on Security and Compliance in Business Processes


When Aug 26, 2015 - Aug 26, 2015
Where Tartu, Estonia
Submission Deadline Jun 4, 2015
Notification Due Jun 29, 2015
Final Version Due Jul 20, 2015
Categories    business process security   business process compliance   security engineering   information systems

Call For Papers


Extended deadline --- June 4, 2015

Co-located with the 14th Int’l Conf. on Perspectives in Business Informatics Research, Tartu, Estonia (BIR 2015)


Submission deadline: June 4, 2015
Notification: June 29, 2015
Camera Ready: July 20, 2015
Workshop Date: August 26, 2015

Despite the growing demand for business processes that comply with security policies, security and privacy incidents caused by erroneous workflow specifications are regrettably common. This is, in part, because business process management and security are seldom addressed together, thereby hindering the development of trustworthy and security-compliant business processes. The Workshop on Security and Compliance in Business Processes (SCBP’15) seeks to bring together researchers and practitioners interested in the management and modelling of secure and compliant business processes in process-aware information systems. In particular, SCBP’15 encourages innovative methods for workflow security modelling, security compliance, audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues. 

The goal of SCBP’15 is to obtain a deeper understanding of a rapidly maturing, yet still largely under-investigated field of business process security, audit and control, including both thorough security requirements formalisation, secure process modelling, and mechanisms for verification, monitoring and auditing. Besides the “technical” intent to substantially advance the current state of the art, SCBP’15 aims to locate active research areas in academia and industry; get a snapshot of the current approaches and existing tool-support; encourage approaches and techniques that combine formal foundations with industrial applicability; and identify new research directions and challenges. In tackling these questions we hope to make a substantial contribution to reliable and secure business process management.

Audit reduction
Business provenance
Case studies
Conformance/compliance checking
Continuous audit
Cost-benefit analysis
Data-centric process mining
Economics of audit
Experience reports
Formal reasoning
Fraud detection
Information flow control
Meta-models for analysis
Operational decision support
Privacy-aware process discovery
Requirements elicitation
Requirements formalisation
Risk Measurement
Runtime verification and monitoring
Security modelling
Security testing
Trace clustering
Usage control
Workflow forensics
Workflow simulation

Submitted manuscripts must be written in English and papers can be submitted in two categories: 
1. full papers (no longer than 12 pages), and
2. research in progress & experience report (no longer than 6 pages). 

They must be formatted using the Springer LNBIP format format and submitted as a PDF document to the Submissions will be reviewed on the basis of their originality, significance, technical soundness and clarity of exposition. Each submission will be reviewed by at least three PC members. Submitted manuscripts must not substantially overlap manuscripts that have been published or submitted to another peer-reviewed conference or journal.

Accepted workshop papers will be published in the CEUR proceedings. Authors of the best papers will be invited to submit the extended papers to a special issue of the journal on Complex Systems Informatics and Modeling Quarterly (CSIMQ).

Achim D. Brucker, SAP Labs, Germany
Isabelle Comyn-Wattiau, ESSEC Business School, France
Eduardo Fernández, Florida Atlantic University, US
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Anat Goldstein, Ben-Gurion University of the Negev, Israel
Jan Jürjens, Technical University of Dortmund, Germany
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Per Håkon Meland, SINTEF ICT, Norway
Haralambos Mouratidis, University of Brighton, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, Universität Regensburg, Germany
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Nicola Zannone, Eindhoven University of Technology, the Netherlands

Naved Ahmed, University of Tartu, Estonia
Raimundas Matulevicius, University of Tartu, Estonia


Related Resources

MKWI Teilkonferenz 2016   MKWI-Teilkonferenz: Sicherheit, Compliance und Verfügbarkeit von Geschäftsprozessen
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
BigData-FAB 2016   Special Issue on “Big Data and Machine Learning in Finance, Accounting and Business” in Electronic Commerce Research (Springer)
ICEIS 2017   19th International Conference on Enterprise Information Systems
IJISS 2016   International Journal of Information Security Science (IJISS)
ENASE 2017   12th International Conference on Evaluation of Novel Approaches to Software Engineering
EJEMS - 4 2016   European Journal of Economics and Management Sciences
ICISDM 2017   2017 International Conference on Information System and Data Mining (ICISDM 2017)-SCOPUS, Ei Compendex
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
IAIT 2016   The 8th International Conference on Advances in Information Technology (IAIT 2016)