-
1
-
-
33750059814
-
Towards a security engineering process
-
Orlando, Florida, USA.
-
Artelsmair, C. and Wagner, R.; Towards a Security Engineering Process, The 7th World Multiconference on Systemlos, Cybernetics and Informatics. Vol. VI. Orlando, Florida, USA. (2003). pp.22-27.
-
(2003)
The 7th World Multiconference on Systemlos, Cybernetics and Informatics
, vol.4
, pp. 22-27
-
-
Artelsmair, C.1
Wagner, R.2
-
2
-
-
33644553339
-
Security in business process engineering
-
LNCS. Eindhoven, The Netherlands
-
Backes, M., Pfitzmann, B. and Waider, M.; Security in Business Process Engineering, International Conference on Business Process Management. Vol. 2678, LNCS. Eindhoven, The Netherlands. (2003). pp. 168-183.
-
(2003)
International Conference on Business Process Management
, vol.2678
, pp. 168-183
-
-
Backes, M.1
Pfitzmann, B.2
Waider, M.3
-
3
-
-
0141461213
-
UML 2 activity and action models
-
July-August
-
Bock, C.; UML 2 Activity and Action Models, Journal of Object Technology. Vol. 2 (4), July-August. (2003). pp.43-53.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.4
, pp. 43-53
-
-
Bock, C.1
-
4
-
-
2942735594
-
UML 2 activity and action models, part 2: Actions
-
September-October
-
Bock, C.; UML 2 Activity and Action Models, Part 2: Actions, Journal of Object Technology. Vol. 2 (5), September-October. (2003). pp.41-56.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.5
, pp. 41-56
-
-
Bock, C.1
-
6
-
-
2942757657
-
Engineering security requirements
-
January-February
-
Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
7
-
-
2942753973
-
Specifying reusable security requirements
-
January-February
-
Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
8
-
-
0035300743
-
A taxonomy of business process modelling and information systems modelling techniques
-
Giaglis, G. M.; A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques, International Journal of Flexible Manufacturing Systems. Vol. 13 (2). (2001). pp.209-228.
-
(2001)
International Journal of Flexible Manufacturing Systems
, vol.13
, Issue.2
, pp. 209-228
-
-
Giaglis, G.M.1
-
10
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
April 2-6, 2001, Proceedings
-
Jürjens, J.; Towards Development of Secure Systems Using UMLsec, Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001 Genova, Italy, April 2-6, 2001, Proceedings. Vol. 2029. (2001). pp.187-200.
-
(2001)
Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001 Genova, Italy
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
-
11
-
-
33750037373
-
UML business modeling profile
-
Vilnius, Lithuania
-
Kalnins, A., Barzdins, J. and Celms, E.; UML Business Modeling Profile, Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education. Vilnius, Lithuania. (2004). pp. 182-194.
-
(2004)
Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education
, pp. 182-194
-
-
Kalnins, A.1
Barzdins, J.2
Celms, E.3
-
13
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Dresden, Germany
-
Lodderstedt, T., Basin, D. and Doser, J.; SecureUML: A UML-Based Modeling Language for Model-Driven Security, UML 2002 - The Unified Modeling Language, 5th International Conference. Vol. 2460. Dresden, Germany. (2002). pp.426-441.
-
(2002)
UML 2002 - The Unified Modeling Language, 5th International Conference
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
14
-
-
17744394269
-
Specification and design of advanced authentication and authorization services
-
Lopez, J., Montenegro, J. A., Vivas, J. L., Okamoto, E. and Dawson, E.; Specification and design of advanced authentication and authorization services, Computer Standards & Interfaces. Vol. 27 (5). (2005). pp.467-478.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 467-478
-
-
Lopez, J.1
Montenegro, J.A.2
Vivas, J.L.3
Okamoto, E.4
Dawson, E.5
-
15
-
-
33750048791
-
A business process-driven approach to security engineering
-
Prague, Czech Republic
-
Maña, A., Montenegro, J. A., Rudolph, C. and Vivas, J. L.; A business process-driven approach to security engineering, 14th. International Workshop on Database and Expert Systems Applications (DEXA). Prague, Czech Republic. (2003). pp.477-481.
-
(2003)
14th. International Workshop on Database and Expert Systems Applications (DEXA)
, pp. 477-481
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
16
-
-
33750073251
-
Integrando la ingeniería de seguridad en un proceso de ingeniería software
-
Leganés, Madrid. España
-
Maña, A., Ray, D., Sánchez, F. and Yagüe, M. I.; Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software, VIII Reunion Española de Criptología y Seguridad de la Información, RECSI'04. Leganés, Madrid. España. (2004). pp.383-392.
-
(2004)
VIII Reunion Española de Criptología y Seguridad de la Información, RECSI'04
, pp. 383-392
-
-
Maña, A.1
Ray, D.2
Sánchez, F.3
Yagüe, M.I.4
-
17
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
Mouratidis, H., Giorgini, P. and Manson, G. A.; When security meets software engineering: a case of modelling secure information systems, Information Systems. Vol. 30 (8). (2005). pp.609-629.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
19
-
-
33750060100
-
Survivability and business continuity management
-
Dunedin, New Zealand
-
Quirchmayr, G.; Survivability and Business Continuity Management, ACSW Frontiers 2004 Workshops. Dunedin, New Zealand. (2004). pp.3-6.
-
(2004)
ACSW Frontiers 2004 Workshops
, pp. 3-6
-
-
Quirchmayr, G.1
-
20
-
-
84942786976
-
A language for modelling secure business transactions
-
Phoenix, Arizona
-
Rohm, A. W., Herrmann, G. and Pernul, G.; A Language for Modelling Secure Business Transactions, 15th. Annual Computer Security Applications Conference. Phoenix, Arizona. (1999). pp.22-31.
-
(1999)
15th. Annual Computer Security Applications Conference
, pp. 22-31
-
-
Rohm, A.W.1
Herrmann, G.2
Pernul, G.3
-
22
-
-
33750062930
-
Extending UML 2 activity diagrams with business intelligence objects
-
Copenhagen, Denmark
-
Stefanov, V., List, B. and Korherr, B.; Extending UML 2 Activity Diagrams with Business Intelligence Objects, 7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005). Copenhagen, Denmark. (2005).
-
(2005)
7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005)
-
-
Stefanov, V.1
List, B.2
Korherr, B.3
-
23
-
-
84904349582
-
Perceptions of security contributing to the implementation of secure IS
-
Security and Privacy in the Age of Uncertainty, Athens, Greece
-
Tryfonas, T. and Kiountouzis, E. A.; Perceptions of Security Contributing to the Implementation of Secure IS, Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003). Vol. 250. Athens, Greece. (2003). pp.313-324.
-
(2003)
IFIP TC11 18th International Conference on Information Security (SEC2003)
, vol.250
, pp. 313-324
-
-
Tryfonas, T.1
Kiountouzis, E.A.2
-
24
-
-
35248832632
-
Towards a business process-driven framework for security engineering with the UML
-
Bristol, U.K.
-
Vivas, J. L., Montenegro, J. A. and Lopez, J.; Towards a Business Process-Driven Framework for security Engineering with the UML, Information Security. 6th International Conference, ISC 2003, Bristol, U.K. (2003). pp.381-395.
-
(2003)
Information Security. 6th International Conference, ISC 2003
, pp. 381-395
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
-
25
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
Zuccato, A.; Holistic security requirement engineering for electronic commerce, Computers & Security. Vol. 23 (1). (2004). pp.63-76.
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63-76
-
-
Zuccato, A.1
|