A procedure to potentially fortify vulnerable tasks of eCommerce and Business processes from compromise is presented. The procedure involves decentralizing the vulnerable tasks to diffuse the attack surface available to a process adversary. This draws on some of the observed success of...