메뉴 건너뛰기




Volumn 4083 LNCS, Issue , 2006, Pages 51-61

Towards a UML 2.0 extension for the modeling of security requirements in business processes

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; PROCESS CONTROL; SOFTWARE ENGINEERING;

EID: 33750083883     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11824633_6     Document Type: Conference Paper
Times cited : (49)

References (25)
  • 3
    • 0141461213 scopus 로고    scopus 로고
    • UML 2 activity and action models
    • July-August
    • Bock, C.; UML 2 Activity and Action Models, Journal of Object Technology. Vol. 2 (4), July-August. (2003). pp.43-53.
    • (2003) Journal of Object Technology , vol.2 , Issue.4 , pp. 43-53
    • Bock, C.1
  • 4
    • 2942735594 scopus 로고    scopus 로고
    • UML 2 activity and action models, part 2: Actions
    • September-October
    • Bock, C.; UML 2 Activity and Action Models, Part 2: Actions, Journal of Object Technology. Vol. 2 (5), September-October. (2003). pp.41-56.
    • (2003) Journal of Object Technology , vol.2 , Issue.5 , pp. 41-56
    • Bock, C.1
  • 6
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • January-February
    • Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.1
  • 7
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • January-February
    • Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 8
    • 0035300743 scopus 로고    scopus 로고
    • A taxonomy of business process modelling and information systems modelling techniques
    • Giaglis, G. M.; A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques, International Journal of Flexible Manufacturing Systems. Vol. 13 (2). (2001). pp.209-228.
    • (2001) International Journal of Flexible Manufacturing Systems , vol.13 , Issue.2 , pp. 209-228
    • Giaglis, G.M.1
  • 14
    • 17744394269 scopus 로고    scopus 로고
    • Specification and design of advanced authentication and authorization services
    • Lopez, J., Montenegro, J. A., Vivas, J. L., Okamoto, E. and Dawson, E.; Specification and design of advanced authentication and authorization services, Computer Standards & Interfaces. Vol. 27 (5). (2005). pp.467-478.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.5 , pp. 467-478
    • Lopez, J.1    Montenegro, J.A.2    Vivas, J.L.3    Okamoto, E.4    Dawson, E.5
  • 17
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • Mouratidis, H., Giorgini, P. and Manson, G. A.; When security meets software engineering: a case of modelling secure information systems, Information Systems. Vol. 30 (8). (2005). pp.609-629.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 19
    • 33750060100 scopus 로고    scopus 로고
    • Survivability and business continuity management
    • Dunedin, New Zealand
    • Quirchmayr, G.; Survivability and Business Continuity Management, ACSW Frontiers 2004 Workshops. Dunedin, New Zealand. (2004). pp.3-6.
    • (2004) ACSW Frontiers 2004 Workshops , pp. 3-6
    • Quirchmayr, G.1
  • 23
    • 84904349582 scopus 로고    scopus 로고
    • Perceptions of security contributing to the implementation of secure IS
    • Security and Privacy in the Age of Uncertainty, Athens, Greece
    • Tryfonas, T. and Kiountouzis, E. A.; Perceptions of Security Contributing to the Implementation of Secure IS, Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003). Vol. 250. Athens, Greece. (2003). pp.313-324.
    • (2003) IFIP TC11 18th International Conference on Information Security (SEC2003) , vol.250 , pp. 313-324
    • Tryfonas, T.1    Kiountouzis, E.A.2
  • 25
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • Zuccato, A.; Holistic security requirement engineering for electronic commerce, Computers & Security. Vol. 23 (1). (2004). pp.63-76.
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 63-76
    • Zuccato, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.