메뉴 건너뛰기




Volumn 4231 LNCS, Issue , 2006, Pages 32-42

Capturing security requirements in business processes through a UML 2.0 activity diagrams profile

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; ADMINISTRATIVE DATA PROCESSING; COMPUTER SOFTWARE; DATA ACQUISITION; ELECTRONIC COMMERCE; ELECTRONIC DATA INTERCHANGE; INDUSTRIAL ECONOMICS;

EID: 33845208648     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11908883_6     Document Type: Conference Paper
Times cited : (15)

References (28)
  • 5
    • 0141461213 scopus 로고    scopus 로고
    • UML 2 activity and action models
    • July-August
    • Bock, C.; UML 2 Activity and Action Models, Journal of Object Technology. Vol. 2 (4), July-August. (2003). pp.43-53.
    • (2003) Journal of Object Technology , vol.2 , Issue.4 , pp. 43-53
    • Bock, C.1
  • 7
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • January-February
    • Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.1
  • 8
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • January-February
    • Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 16
    • 17744394269 scopus 로고    scopus 로고
    • Specification and design of advanced authentication and authorization services
    • Lopez, J., Montenegro, J. A., Vivas, J. L., Okamoto, E. and Dawson, E.; Specification and design of advanced authentication and authorization services, Computer Standards & Interfaces. Vol. 27 (5). (2005). pp.467-478.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.5 , pp. 467-478
    • Lopez, J.1    Montenegro, J.A.2    Vivas, J.L.3    Okamoto, E.4    Dawson, E.5
  • 19
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • Mouratidis, H., Giorgini, P. and Manson, G. A.; When security meets software engineering: a case of modelling secure information systems, Information Systems. Vol. 30 (8). (2005). pp.609-629.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 22
    • 33750060100 scopus 로고    scopus 로고
    • Survivability and business continuity management
    • Dunedin, New Zealand
    • Quirchmayr, G.; Survivability and Business Continuity Management, ACSW Frontiers 2004 Workshops. Dunedin, New Zealand. (2004). pp.3-6.
    • (2004) ACSW Frontiers 2004 Workshops , pp. 3-6
    • Quirchmayr, G.1
  • 25
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • Siponen, M. T.; Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods, Information and Organization. Vol. 15. (2005). pp.339-375.
    • (2005) Information and Organization , vol.15 , pp. 339-375
    • Siponen, M.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.