-
1
-
-
0012755342
-
A wider view of business process reengineering
-
D. Grant, "A wider view of business process reengineering", Communications of the ACM (CACM), Vol. 45 (2), pp. 85-90, 2002.
-
(2002)
Communications of the ACM (CACM)
, vol.45
, Issue.2
, pp. 85-90
-
-
Grant, D.1
-
2
-
-
3042847553
-
Business process management: A survey
-
presented at, Eindhoven, The Netherlands
-
W.M.P. van der Aalst, A. H. M. t. Hofstede, and M. Weske, "Business Process Management: A Survey", presented at International Conference on Business Process Management (BPM 2003), Eindhoven, The Netherlands., 2003.
-
(2003)
International Conference on Business Process Management (BPM 2003)
-
-
Van Der Aalst, W.M.P.1
Hofstede, A.H.M.T.2
Weske, M.3
-
4
-
-
33750060100
-
Survivability and business continuity management
-
presented at, Dunedin, New Zealand
-
G. Quirchmayr, "Survivability and Business Continuity Management", presented at ACSW Frontiers 2004 Workshops., Dunedin, New Zealand, 2004.
-
(2004)
ACSW Frontiers 2004 Workshops
-
-
Quirchmayr, G.1
-
5
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
A. Zuccato, "Holistic security requirement engineering for electronic commerce", Computers & Security, Vol. 23 (1), pp. 63-76, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63-76
-
-
Zuccato, A.1
-
6
-
-
33750066700
-
Security in business process engineering
-
presented at, Eindhoven, The Netherlands
-
M. Backes, B. Pfitzmann, and M. Waider, "Security in Business Process Engineering", presented at International Conference on Business Process Management, Eindhoven, The Netherlands., 2003.
-
(2003)
International Conference on Business Process Management
-
-
Backes, M.1
Pfitzmann, B.2
Waider, M.3
-
8
-
-
2942757657
-
Engineering security requirements
-
January-February
-
D. Firesmith, "Engineering Security Requirements", Journal of Object Technology, Vol. 2 (1), January-February, pp. 53-68, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
9
-
-
0035300743
-
A taxonomy of business process modelling and information systems modelling techniques
-
G. M. Giaglis, "A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques", International Journal of Flexible Manufacturing Systems, Vol. 13 (2). pp. 209-228, 2001.
-
(2001)
International Journal of Flexible Manufacturing Systems
, vol.13
, Issue.2
, pp. 209-228
-
-
Giaglis, G.M.1
-
11
-
-
0242655790
-
SecureUML: A UML-based modeling language for model-driven security
-
presented at, Dresden, Germany
-
T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security", presented at UML 2002 - The Unified Modeling Language, 5th International Conference., Dresden, Germany., 2002.
-
(2002)
UML 2002 - The Unified Modeling Language, 5th International Conference
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
12
-
-
33750941965
-
Integrando la ingenieria de seguridad en un proceso de ingenieria software
-
presented at, Leganés, Madrid. España
-
A. Mafia, D. Ray, F. Sánchez, and M. I. Yagüe, "Integrando la Ingenieria de Seguridad en un Proceso de Ingenieria Software", presented at Actas de la VIII Reunion Española de Criptología y Seguridad de la Information, RECSI'04, Leganés, Madrid. España, 2004.
-
(2004)
Actas de la VIII Reunion Española de Criptología y Seguridad de la Information, RECSI'04
-
-
Mafia, A.1
Ray, D.2
Sánchez, F.3
Yagüe, M.I.4
-
13
-
-
2942753973
-
Specifying reusable security requirements
-
January-February
-
D. Firesmith, "Specifying Reusable Security Requirements", Journal of Object Technology, Vol. 3 (1), January-February., pp. 61-75, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
14
-
-
33750048791
-
A business process-driven approach to security engineering
-
presented at. Prague, Czech Republic
-
A. Mafia, J. A. Montenegro, C. Rudolph, and J. L. Vivas, "A business process-driven approach to security engineering", presented at 14th. International Workshop on Database and Expert Systems Applications (DEXA). Prague, Czech Republic., 2003.
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA)
-
-
Mafia, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
15
-
-
84942786976
-
A language for modelling secure business transactions
-
presented at, Phoenix, Arizona
-
A. W. Rohm, G. Herrmann, and G. Pernul, "A Language for Modelling Secure Business Transactions", presented at 15th. Annual Computer Security Applications Conference., Phoenix, Arizona., 1999.
-
(1999)
15th Annual Computer Security Applications Conference
-
-
Rohm, A.W.1
Herrmann, G.2
Pernul, G.3
-
16
-
-
84904349582
-
Perceptions of security contributing to the implementation of secure IS
-
presented at, Security and Privacy in the Age of Uncertainty, Athens, Greece
-
T. Tryfonas and E. A. Kiountouzis, "Perceptions of Security Contributing to the Implementation of Secure IS", presented at Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), Athens, Greece., 2003.
-
(2003)
IFIP TC11 18th International Conference on Information Security (SEC2003)
-
-
Tryfonas, T.1
Kiountouzis, E.A.2
-
18
-
-
33750062930
-
Extending UML 2 activity diagrams with business intelligence objects
-
presented at, Copenhagen, Denmark
-
V. Stefanov, B. List, and B. Korherr, "Extending UML 2 Activity Diagrams with Business Intelligence Objects", presented at 7th International Conference on Data Warhousing and Knowledge Discovery (DaWaK2005), Copenhagen, Denmark, 2005.
-
(2005)
7th International Conference on Data Warhousing and Knowledge Discovery (DaWaK2005)
-
-
Stefanov, V.1
List, B.2
Korherr, B.3
-
19
-
-
33750037373
-
UML business modeling profile
-
presented at, Advances in Theory, Practice and Education, Vilnius, Lithuania
-
A. Kalnins, J. Barzdins, and E. Celms, "UML Business Modeling Profile", presented at Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education, Vilnius, Lithuania, 2004.
-
(2004)
Thirteenth International Conference on Information Systems Development
-
-
Kalnins, A.1
Barzdins, J.2
Celms, E.3
-
20
-
-
78651456570
-
Towards an integration of security requirements into business process modeling
-
presented at, In conjunction with ICEIS 2005, Miami, USA
-
A. Rodríguez, E. Fernández-Medina, and M. Piattini, "Towards an integration of Security Requirements into Business Process Modeling", presented at Proceedings of the Third International Workshop on Security In Information Systems, WOSIS 2005, In conjunction with ICEIS 2005, Miami, USA, 2005.
-
(2005)
Proceedings of the Third International Workshop on Security in Information Systems, WOSIS 2005
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
22
-
-
0141461213
-
UML 2 activity and action models
-
July-August
-
C. Bock, "UML 2 Activity and Action Models", Journal of Object Technology, Vol. 2 (4), July-August, pp. 43-53, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.4
, pp. 43-53
-
-
Bock, C.1
-
24
-
-
2942735594
-
UML 2 activity and action models, part 2: Actions
-
September-October
-
C. Bock, "UML 2 Activity and Action Models, Part 2: Actions", Journal of Object Technology, Vol. 2 (5), September-October, pp. 41-56, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.5
, pp. 41-56
-
-
Bock, C.1
-
25
-
-
2942742393
-
UML 2 activity and action models, part 3: Control nodes
-
November-December
-
C. Bock, "UML 2 Activity and Action Models, Part 3: Control Nodes", Journal of Object Technology, Vol. 2 (6), November-December, pp. 7-23, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.6
, pp. 7-23
-
-
Bock, C.1
-
26
-
-
2942755829
-
UML 2 activity and action models, part 4: Object nodes
-
January-February
-
C. Bock, "UML 2 Activity and Action Models, Part 4: Object Nodes", Journal of Object Technology, Vol. 3 (1), January-February, pp. 27-41, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 27-41
-
-
Bock, C.1
-
27
-
-
4644311887
-
UML 2 activity and action models, part 5: Partitions
-
July-August
-
C. Bock, "UML 2 Activity and Action Models, Part 5: Partitions", Journal of Object Technology, Vol. 3 (7), July-August, pp. 37-56, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.7
, pp. 37-56
-
-
Bock, C.1
-
28
-
-
22944490534
-
UML 2 activity and action models, part 6: Structured activities
-
May-June
-
C. Bock, "UML 2 Activity and Action Models, Part 6: Structured Activities", Journal of Object Technology, Vol. 4 (4), May-June, pp. 43-66, 2005.
-
(2005)
Journal of Object Technology
, vol.4
, Issue.4
, pp. 43-66
-
-
Bock, C.1
|