메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 670-677

Security requirement with a UML 2.0 profile

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; INDUSTRIAL MANAGEMENT; LOGIC DESIGN; PRODUCT DEVELOPMENT;

EID: 33750940979     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2006.125     Document Type: Conference Paper
Times cited : (29)

References (28)
  • 1
    • 0012755342 scopus 로고    scopus 로고
    • A wider view of business process reengineering
    • D. Grant, "A wider view of business process reengineering", Communications of the ACM (CACM), Vol. 45 (2), pp. 85-90, 2002.
    • (2002) Communications of the ACM (CACM) , vol.45 , Issue.2 , pp. 85-90
    • Grant, D.1
  • 4
    • 33750060100 scopus 로고    scopus 로고
    • Survivability and business continuity management
    • presented at, Dunedin, New Zealand
    • G. Quirchmayr, "Survivability and Business Continuity Management", presented at ACSW Frontiers 2004 Workshops., Dunedin, New Zealand, 2004.
    • (2004) ACSW Frontiers 2004 Workshops
    • Quirchmayr, G.1
  • 5
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • A. Zuccato, "Holistic security requirement engineering for electronic commerce", Computers & Security, Vol. 23 (1), pp. 63-76, 2004.
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 63-76
    • Zuccato, A.1
  • 8
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • January-February
    • D. Firesmith, "Engineering Security Requirements", Journal of Object Technology, Vol. 2 (1), January-February, pp. 53-68, 2003.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.1
  • 9
    • 0035300743 scopus 로고    scopus 로고
    • A taxonomy of business process modelling and information systems modelling techniques
    • G. M. Giaglis, "A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques", International Journal of Flexible Manufacturing Systems, Vol. 13 (2). pp. 209-228, 2001.
    • (2001) International Journal of Flexible Manufacturing Systems , vol.13 , Issue.2 , pp. 209-228
    • Giaglis, G.M.1
  • 13
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • January-February
    • D. Firesmith, "Specifying Reusable Security Requirements", Journal of Object Technology, Vol. 3 (1), January-February., pp. 61-75, 2004.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 16
    • 84904349582 scopus 로고    scopus 로고
    • Perceptions of security contributing to the implementation of secure IS
    • presented at, Security and Privacy in the Age of Uncertainty, Athens, Greece
    • T. Tryfonas and E. A. Kiountouzis, "Perceptions of Security Contributing to the Implementation of Secure IS", presented at Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), Athens, Greece., 2003.
    • (2003) IFIP TC11 18th International Conference on Information Security (SEC2003)
    • Tryfonas, T.1    Kiountouzis, E.A.2
  • 22
    • 0141461213 scopus 로고    scopus 로고
    • UML 2 activity and action models
    • July-August
    • C. Bock, "UML 2 Activity and Action Models", Journal of Object Technology, Vol. 2 (4), July-August, pp. 43-53, 2003.
    • (2003) Journal of Object Technology , vol.2 , Issue.4 , pp. 43-53
    • Bock, C.1
  • 24
    • 2942735594 scopus 로고    scopus 로고
    • UML 2 activity and action models, part 2: Actions
    • September-October
    • C. Bock, "UML 2 Activity and Action Models, Part 2: Actions", Journal of Object Technology, Vol. 2 (5), September-October, pp. 41-56, 2003.
    • (2003) Journal of Object Technology , vol.2 , Issue.5 , pp. 41-56
    • Bock, C.1
  • 25
    • 2942742393 scopus 로고    scopus 로고
    • UML 2 activity and action models, part 3: Control nodes
    • November-December
    • C. Bock, "UML 2 Activity and Action Models, Part 3: Control Nodes", Journal of Object Technology, Vol. 2 (6), November-December, pp. 7-23, 2003.
    • (2003) Journal of Object Technology , vol.2 , Issue.6 , pp. 7-23
    • Bock, C.1
  • 26
    • 2942755829 scopus 로고    scopus 로고
    • UML 2 activity and action models, part 4: Object nodes
    • January-February
    • C. Bock, "UML 2 Activity and Action Models, Part 4: Object Nodes", Journal of Object Technology, Vol. 3 (1), January-February, pp. 27-41, 2004.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 27-41
    • Bock, C.1
  • 27
    • 4644311887 scopus 로고    scopus 로고
    • UML 2 activity and action models, part 5: Partitions
    • July-August
    • C. Bock, "UML 2 Activity and Action Models, Part 5: Partitions", Journal of Object Technology, Vol. 3 (7), July-August, pp. 37-56, 2004.
    • (2004) Journal of Object Technology , vol.3 , Issue.7 , pp. 37-56
    • Bock, C.1
  • 28
    • 22944490534 scopus 로고    scopus 로고
    • UML 2 activity and action models, part 6: Structured activities
    • May-June
    • C. Bock, "UML 2 Activity and Action Models, Part 6: Structured Activities", Journal of Object Technology, Vol. 4 (4), May-June, pp. 43-66, 2005.
    • (2005) Journal of Object Technology , vol.4 , Issue.4 , pp. 43-66
    • Bock, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.