SCBP'15
WORKSHOP ON SECURITY AND COMPLIANCE IN BUSINESS PROCESSES
Co-located with the 14th Int’l Conf. on Perspectives in Business Informatics Research, Tartu, Estonia
(BIR 2015)






















SCOPE

PROGRAM

KEYNOTE

SUBMISSION

DATES

ORGANIZERS

COMMITTEE

PREVIOUS























Get the flyer 
SCOPE

Despite the growing demand for business processes that comply with security policies, security and privacy incidents caused by erroneous workflow specifications are regrettably common. This is, in part, because business process management and security are seldom addressed together, thereby hindering the development of trustworthy and security-compliant business processes. The Workshop on Security and Compliance in Business Processes (SCBP’15) seeks to bring together researchers and practitioners interested in the management and modelling of secure and compliant business processes in process-aware information systems. In particular, SCBP’15 encourages innovative methods for workflow security modelling, security compliance, audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues.

The goal of SCBP’15 is to obtain a deeper understanding of a rapidly maturing, yet still largely under-investigated field of business process security, audit and control, including both thorough security requirements formalization, secure process modelling, and mechanisms for verification, monitoring and auditing. Besides the “technical” intent to substantially advance the current state of the art, SCBP’15 aims to locate active research areas in academia and industry; get a snapshot of the current approaches and existing tool-support; encourage approaches and techniques that combine formal foundations with industrial applicability; and identify new research directions and challenges. In tackling these questions we hope to make a substantial contribution to reliable and secure business process management.

In particular, SCBP’15 encourages innovative methods for workflow security modelling, security audit and control throughout the business process lifecycle: from design time verification to online operational support and post-mortem analysis. Furthermore, it welcomes contributions beyond the strictly technical, such as those considering social, economic, legal and standardisation issues.

Topics of Interest:
  • Alignment
  • Authorization
  • Accountability
  • Audit reduction
  • Business provenance
  • Case studies
  • Conformance/compliance checking
  • Continuous audit
  • Cost-benefit analysis
  • Data-centric process mining
  • Economics of audit
  • Experience reports
  • Formal reasoning
  • Fraud detection
  • Information flow control
  • Meta-models for analysis
  • Operational decision support
  • Privacy-aware process discovery
  • Requirements elicitation
  • Requirements formalization
  • Risk Measurement
  • Runtime verification and monitoring
  • Security modelling
  • Security testing
  • Trace clustering
  • Usage control
  • Workflow forensics
  • Workflow simulation
PROGRAM

To be announced later..



KEYNOTE

To be announced later..




SUBMISSION GUIDELINES

Submitted manuscripts must be written in English and papers can be submitted in two categories: 1) full papers (no longer than 12 pages), and 2) research in progress & experience report (no longer than 6 pages). They must be formatted using the LNBIP format format and submitted as a PDF document to the EasyChair website. Submissions will be reviewed on the basis of their originality, significance, technical soundness and clarity of exposition.  Each submission will be reviewed by at least three PC members. Submitted manuscripts must not substantially overlap manuscripts that have been published or submitted to another peer-reviewed conference or journal.

Accepted workshop papers will be published in the
CEUR proceedings. Authors of the best papers will be invited to submit the extended papers to a special issue of the journal on Complex Systems Informatics and Modeling Quarterly (CSIMQ).

IMPORTANT DATES
  • Paper submission: June 4th, 2015 (extended)
  • Paper notification: June 29th, 2015
  • Camera-ready: July 20th, 2015
  • Workshop: August 26th, 2015
ORGANIZERS

Program Committee Chairs
PROGRAM COMMITTEE
  • Achim D. Brucker, SAP Labs, Germany
  • Isabelle Comyn-Wattiau, ESSEC Business School, France
  • Eduardo Fernández, Florida Atlantic University, US
  • Khaled Gaaloul, CRP Henri Tudor, Luxembourg
  • Anat Goldstein, Ben-Gurion University of the Negev, Israel
  • Jan Jürjens, Technical University of Dortmund, Germany
  • Seok-Won Lee, Ajou University, Korea
  • Lin Liu, Tsinghua University, China
  • Per Håkon Meland, SINTEF ICT, Norway
  • Haralambos Mouratidis, University of Brighton, UK
  • Andreas Opdahl, University of Bergen, Norway
  • Günther Pernul, Universität Regensburg, Germany
  • Stefanie Rinderle-Ma, University of Vienna, Austria
  • David G. Rosado, University of Castilla-La Mancha, Spain
  • Guttorm Sindre, Norwegian University of Science and Technology, Norway
  • Nicola Zannone, Eindhoven University of Technology, the Netherlands
PREVIOUS WORKSHOPS AND  EVENTS

2014: SBP'14
2013: SBP'13 (see the report), Dagstuhl Seminar on Verifiably Secure PaIS (see the report)
2012: SBP'12 ( see the report)
2011: ABPSM'11, WfSAC'11