This project aims to develop connectors that meet the requirements of information security, such as: integrity, confidentiality , non-repudiation and authenticity.
The repository already contains developed connectors for integrity, encryption, decryption , digital printing and digital signature with digital certificates PKCS#12.
The development of connectors that meet other Information Security Requirements are welcome.
I need to handle data that is restricted according to different actors.
Can I define in someway that data so it is handled differently whether is one actor or another.
And also how is data secured in terms of attackers trying to steal data with attacks like men in the middle or any other types of attacks.
Can data be encrypted in the database used by Bonita or when transmitted to an external database?
How do we forecast relationships between BPM (Business Process Modeling) and Information Security visual thinking at Sekimia?
The MindsetPimp proof of concept code was designed for the Pimp my Bonita Open Source BPM Community Contest :