{"_id":"5080","status":"public","year":"2019","type":"conference","publication_status":"published","title":"Managing Security Objects and -Processes Using an Extended BPM Approach and -System","citation":{"chicago":"Küster, Jochen, Niklaus Meyer, Hagen Volzer, Maria Dubovitskaya, Michael Osborne, and Axel Tanner. “Managing Security Objects and -Processes Using an Extended BPM Approach and -System.” In <i>2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)</i>, edited by IEEE, 197–205. IEEE, 2019. <a href=\"https://doi.org/10.1109/EDOC.2019.00032\">https://doi.org/10.1109/EDOC.2019.00032</a>.","alphadin":"<span style=\"font-variant:small-caps;\">Küster, Jochen</span> ; <span style=\"font-variant:small-caps;\">Meyer, Niklaus</span> ; <span style=\"font-variant:small-caps;\">Volzer, Hagen</span> ; <span style=\"font-variant:small-caps;\">Dubovitskaya, Maria</span> ; <span style=\"font-variant:small-caps;\">Osborne, Michael</span> ; <span style=\"font-variant:small-caps;\">Tanner, Axel</span>: Managing Security Objects and -Processes Using an Extended BPM Approach and -System. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)</i> : IEEE, 2019, S. 197–205","short":"J. Küster, N. Meyer, H. Volzer, M. Dubovitskaya, M. Osborne, A. Tanner, in: IEEE (Ed.), 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC), IEEE, 2019, pp. 197–205.","mla":"Küster, Jochen, et al. “Managing Security Objects and -Processes Using an Extended BPM Approach and -System.” <i>2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)</i>, edited by IEEE, IEEE, 2019, pp. 197–205, doi:<a href=\"https://doi.org/10.1109/EDOC.2019.00032\">10.1109/EDOC.2019.00032</a>.","bibtex":"@inproceedings{Küster_Meyer_Volzer_Dubovitskaya_Osborne_Tanner_2019, title={Managing Security Objects and -Processes Using an Extended BPM Approach and -System}, DOI={<a href=\"https://doi.org/10.1109/EDOC.2019.00032\">10.1109/EDOC.2019.00032</a>}, booktitle={2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)}, publisher={IEEE}, author={Küster, Jochen and Meyer, Niklaus and Volzer, Hagen and Dubovitskaya, Maria and Osborne, Michael and Tanner, Axel}, editor={IEEEEditor}, year={2019}, pages={197–205} }","ieee":"J. Küster, N. Meyer, H. Volzer, M. Dubovitskaya, M. Osborne, and A. Tanner, “Managing Security Objects and -Processes Using an Extended BPM Approach and -System,” in <i>2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)</i>, Paris, France , 2019, pp. 197–205.","apa":"Küster, J., Meyer, N., Volzer, H., Dubovitskaya, M., Osborne, M., &#38; Tanner, A. (2019). Managing Security Objects and -Processes Using an Extended BPM Approach and -System. In IEEE (Ed.), <i>2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)</i> (pp. 197–205). Paris, France : IEEE. <a href=\"https://doi.org/10.1109/EDOC.2019.00032\">https://doi.org/10.1109/EDOC.2019.00032</a>","ama":"Küster J, Meyer N, Volzer H, Dubovitskaya M, Osborne M, Tanner A. Managing Security Objects and -Processes Using an Extended BPM Approach and -System. In: IEEE, ed. <i>2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)</i>. IEEE; 2019:197-205. doi:<a href=\"https://doi.org/10.1109/EDOC.2019.00032\">10.1109/EDOC.2019.00032</a>"},"abstract":[{"text":"One important use case for (business) process technology is process compliance. We propose that managing security objects such as cryptographic keys is an application domain that can greatly benefit from using process technology because of a critical compliance requirement. To this end, we present a BPMN extension and a design of a support system for key management processes. Both were driven by a case study on a distributed application using a standard hierarchical public key infrastructure, which we also present. Our prototypical implementation of the support system shows that process compliance for security object management processes can be substantially supported with moderate effort by extending the standard process technology.","lang":"eng"}],"language":[{"iso":"eng"}],"publication_identifier":{"eisbn":["978-1-7281-2702-6"]},"date_updated":"2024-11-11T16:18:32Z","date_created":"2024-10-31T10:00:06Z","publication":"2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)","user_id":"220548","page":"197-205","conference":{"end_date":"2019-10-31","name":"2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)","location":"Paris, France ","start_date":"2019-10-28"},"doi":"10.1109/EDOC.2019.00032","publisher":"IEEE","author":[{"first_name":"Jochen","id":"217892","full_name":"Küster, Jochen","last_name":"Küster"},{"first_name":"Niklaus","full_name":"Meyer, Niklaus","last_name":"Meyer"},{"last_name":"Volzer","full_name":"Volzer, Hagen","first_name":"Hagen"},{"first_name":"Maria","last_name":"Dubovitskaya","full_name":"Dubovitskaya, Maria"},{"first_name":"Michael","full_name":"Osborne, Michael","last_name":"Osborne"},{"first_name":"Axel","full_name":"Tanner, Axel","last_name":"Tanner"}],"project":[{"_id":"f432a2ee-bceb-11ed-a251-a83585c5074d","name":"Institute for Data Science Solutions"}],"corporate_editor":["IEEE"]}