Abstract
New technologies like cloud computing and new business models bring new capabilities for hosting and offering complex collaborative business operations. However, these advances can also bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboration and data exchange over the Internet. Hence, users become more concerned about the trust, e.g., trust in services for critical business processes with sensitive data. Since trust is subjective, trustworthiness requirements for addressing trust concerns are difficult to elicit, especially if there are different parties involved in the business process. In this paper, we propose a user-centered trustworthiness requirement analysis and modeling framework. Using goal models for capturing the users’ trust concerns can motivate design decisions with respect to trustworthiness. We purpose integrating the subjective trust concerns into goal models and embedding them into business process models as objective trustworthiness requirements. This paper addresses the gap in considering trustworthiness requirements during automation (in providing supporting software) of business processes. We demonstrate our approach on an application example from the health-care domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Avancha, S., Baxi, A., Kotz, D.: Privacy in mobile technology for personal healthcare. ACM Comput. Surv. 45(1), 1–54 (2012)
Cabanillas, C., Knuplesch, D., Resinas, M., Reichert, M., Mendling, J., Ruiz-Cortés, A.: RALph: a graphical notation for resource assignments in business processes. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 53–68. Springer, Heidelberg (2015)
Di Cerbo, F., Gol Mohammadi, N., Paulus, S.: Evidence-based trustworthiness of internet-based services through controlled software development. In: Cleary, F., et al. (eds.) CSP Forum 2015. CCIS, vol. 530, pp. 91–102. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25360-2_8
Mohammadi, N.G., Bandyszak, T., Goldsteen, A., Kalogiros, C., Weyer, T., Moffie, M., Nasser, B.I., Surridge, M.: Combining risk-management and computational approaches for trustworthiness evaluation of socio-technical systems. In: Proceedings of the CAiSE Forum, pp. 237–244 (2015)
Mohammadi, N.G., Bandyszak, T., Kalogiros, C., Kanakakis, M.: A framework for evaluating the end-to-end trustworthiness. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) (2015)
Mohammadi, N.G., Bandyszak, T., Paulus, S., Meland, P.H., Weyer, T., Pohl, K.: Extending software development methodologies to support trustworthiness-by-design. In: Proceedings of the CAiSE Forum, pp. 213–220 (2015)
Mohammadi, N.G., Heisel, M.: Enhancing business process models with trustworthiness requirements, accepted. In: 10th IFIP WG 11.11 International Conference on Trust Management (2016)
Mohammadi, N.G., Heisel, M.: Patterns for identification of trust concerns and specification of trustworthiness requirements, accepted in the progress of publication (2016)
Mohammadi, N.G., Paulus, S., Bishr, M., Metzger, A., Könnecke, H., Hartenstein, S., Weyer, T., Pohl, K.: Trustworthiness attributes and metrics for engineering trusted internet-based software systems. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F. (eds.) CLOSER 2013. CCIS, vol. 453, pp. 19–35. Springer, Heidelberg (2014)
Koschmider, A., Yingbo, L., Schuster, T.: Role assignment in business process models. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 37–49. Springer, Heidelberg (2012)
Mei, H., Huang, G., Xie, T.: Internetware: a software paradigm for internet computing. Computer 45(6), 26–31 (2012)
Nuseibeh, B.: Weaving together requirements and architectures. Computer 3, 115–119 (2001)
OMG: Business Process Model and Notation (BPMN) version 2.0. Technical report (2011)
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow resource patterns: identification, representation and tool support. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216–232. Springer, Heidelberg (2005)
Short, S., Kaluvuri, S.P.: A data-centric approach for privacy-aware business process enablement. In: van Sinderen, M., Johnson, P. (eds.) IWEI 2011. LNBIP, vol. 76, pp. 191–203. Springer, Heidelberg (2011)
Stepien, B., Felty, A., Matwin, S.: A non-technical user-oriented display notation for XACML conditions. In: Babin, G., Kropf, P., Weiss, M. (eds.) E-Technologies: Innovation in an Open World. LNBIP, vol. 26, pp. 53–64. Springer, Heidelberg (2009)
Strembeck, M., Mendling, J.: Modeling process-related RBAC models with extended UML activity models. Inf. Softw. Technol. 53(5), 456–483 (2011)
Stroppi, L.J.R., Chiotti, O., Villarreal, P.D.: Extending BPMN 2.0: method and tool support. In: Dijkman, R., Hofstetter, J., Koehler, J. (eds.) BPMN 2011. LNBIP, vol. 95, pp. 59–73. Springer, Heidelberg (2011)
Sztompka, P.: Trust: A Sociological Theory. Cambridge University Press, Cambridge (2000)
van der Aalst, W.M.P., Kumar, A.: A reference model for team-enabled workflow management systems. Data Knowl. Eng. 38(3), 335–363 (2001)
Wang, M., Bandara, K., Pahl, C.: Process as a service distributed multi-tenant policy-based process runtime governance. In: IEEE International Conference on Services Computing (SCC), pp. 578–585 (2010)
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Archit. Spec. Issue Secure SOA 55(4), 211–223 (2009)
Yu, E.S.K.: Towards modelling and reasoning support for early-phase requirements engineering. In: Proceedings of the 3rd IEEE International Symposium on Requirements Engineering, pp. 226–235 (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Mohammadi, N.G., Heisel, M. (2016). A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN. In: Katsikas, S., Lambrinoudakis, C., Furnell, S. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2016. Lecture Notes in Computer Science(), vol 9830. Springer, Cham. https://doi.org/10.1007/978-3-319-44341-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-44341-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44340-9
Online ISBN: 978-3-319-44341-6
eBook Packages: Computer ScienceComputer Science (R0)