{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:12:45Z","timestamp":1759133565750},"reference-count":33,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"abstract":"<jats:p>To enjoy the benefits of cloud computing, organizations managing complex business processes want to outsource their processes. However, as such processes express their know-how and because of the nature of the cloud, they are still reluctant to do so. To prevent such a know-how exposure, this article proposes a design-time approach for obfuscating a BP model by splitting its model into a collaboration of BP fragments semantically equivalent to the initial BP. This breaking down renders the discovery by cloud providers of-the-deep content of a critical fragment, and more of the whole process, much harder when these fragments are deployed in a multi-cloud context. While existing contributions on the topic of BP obfuscation remain at the level of principles, the authors propose an algorithm supporting automatically such a BP model transformation. The approach is validated against an obfuscation metric introduced in the article. The obtained results show that the authors' algorithm generates BP fragment with a high obfuscation level, contributing to protect BP know-how when deployed in a multi-cloud context.<\/jats:p>","DOI":"10.4018\/ijwsr.2018100104","type":"journal-article","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T15:24:26Z","timestamp":1536247466000},"page":"61-81","source":"Crossref","is-referenced-by-count":4,"title":["A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment"],"prefix":"10.4018","volume":"15","author":[{"given":"Amina Ahmed","family":"Nacer","sequence":"first","affiliation":[{"name":"LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia, Bejaia, Algeria & LORIA Laboratory, University of Lorraine, Nancy, France"}]},{"given":"Elio","family":"Goettelmann","sequence":"additional","affiliation":[{"name":"LIST Luxembourg Institute of Technology and Loria, Luxembourg, Luxembourg"}]},{"given":"Samir","family":"Youcef","sequence":"additional","affiliation":[{"name":"LORIA Laboratory, University of Lorraine, Nancy, France"}]},{"given":"Abdelkamel","family":"Tari","sequence":"additional","affiliation":[{"name":"LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia, Bejaia, Algeria"}]},{"given":"Claude","family":"Godart","sequence":"additional","affiliation":[{"name":"LORIA Laboratory, University of Lorraine Nancy, France"}]}],"member":"2432","reference":[{"key":"IJWSR.2018100104-0","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2017.28"},{"key":"IJWSR.2018100104-1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2016.9"},{"key":"IJWSR.2018100104-2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_1"},{"key":"IJWSR.2018100104-3","doi-asserted-by":"publisher","DOI":"10.1145\/2347673.2347682"},{"key":"IJWSR.2018100104-4","unstructured":"Briol, P. (2013). BPMN 2.0 Distilled: Business Process Model and Notation. Retrieved from http:\/\/www.bpmn.org"},{"key":"IJWSR.2018100104-5","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(95)91491-H"},{"key":"IJWSR.2018100104-6","doi-asserted-by":"publisher","DOI":"10.1007\/11837862_13"},{"key":"IJWSR.2018100104-7","unstructured":"Cloud Security Alliance. (2014). Security, Trust and Assurance Registry. Retrieved October 15, 2015, from https:\/\/cloudsecurityalliance.org\/star\/"},{"key":"IJWSR.2018100104-8","unstructured":"Collberg, C., Thomborson, C., & Low, D. (1997). A taxonomy of obfuscating transformations. Technical Report 148, Dept. of Computer Science, Univ. of Auckland."},{"key":"IJWSR.2018100104-9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38709-8_8"},{"key":"IJWSR.2018100104-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5"},{"key":"IJWSR.2018100104-11","unstructured":"European Network and Information Security Agency. (2009). Benefits, risks and recommendations for information security."},{"key":"IJWSR.2018100104-12","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0262-z"},{"key":"IJWSR.2018100104-13","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.41"},{"key":"IJWSR.2018100104-14","unstructured":"Fill, H. G. (2012). Using obfuscating transformations for supporting the sharing and analysis of conceptual models. In S.B & D.M Editors (Eds.), Multikonferenz Wirtschaftsinformatik 2012 \u2013Teilkonferenz Modellierung betrieblicher Informations-system. GITO Verlag."},{"key":"IJWSR.2018100104-15","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2015.80"},{"key":"IJWSR.2018100104-16","doi-asserted-by":"publisher","DOI":"10.1145\/2536146.2536164"},{"key":"IJWSR.2018100104-17","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2012.18"},{"key":"IJWSR.2018100104-18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.231113"},{"key":"IJWSR.2018100104-19","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.21"},{"key":"IJWSR.2018100104-20","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855560"},{"key":"IJWSR.2018100104-21","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.85"},{"key":"IJWSR.2018100104-22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74974-5_17"},{"key":"IJWSR.2018100104-23","doi-asserted-by":"publisher","DOI":"10.1007\/3-54053101-7_1"},{"key":"IJWSR.2018100104-24","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555014"},{"key":"IJWSR.2018100104-25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-3394-4_7"},{"key":"IJWSR.2018100104-26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"IJWSR.2018100104-27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89224-3"},{"key":"IJWSR.2018100104-28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15618-2_20"},{"key":"IJWSR.2018100104-29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3540-85758-7_10"},{"key":"IJWSR.2018100104-30","unstructured":"Wroblewski, G. (2002). General method of program code obfuscation."},{"key":"IJWSR.2018100104-31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.247"},{"key":"IJWSR.2018100104-32","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2015.25"}],"container-title":["International Journal of Web Services Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=213914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T13:50:00Z","timestamp":1651845000000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJWSR.2018100104"}},"subtitle":["A Design-Time Approach for BP Obfuscation"],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijwsr.2018100104","relation":{},"ISSN":["1545-7362","1546-5004"],"issn-type":[{"value":"1545-7362","type":"print"},{"value":"1546-5004","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}