-
1
-
-
33748046212
-
Integrating a security requirement language with UML
-
Lisbon, Portugal
-
Abie, H., Aredo, D. B., Kristoffersen, T., Mazaher, S. and Raguin, T.; Integrating a Security Requirement Language with UML, 7th International Conference, The UML: Modelling Languages and Applications. Vol. 3273. Lisbon, Portugal. (2004). pp.350-364.
-
(2004)
7th International Conference, the UML: Modelling Languages and Applications
, vol.3273
, pp. 350-364
-
-
Abie, H.1
Aredo, D.B.2
Kristoffersen, T.3
Mazaher, S.4
Raguin, T.5
-
2
-
-
33750059814
-
Towards a security engineering process
-
Orlando, Florida, USA
-
Artelsmair, C. and Wagner, R.; Towards a Security Engineering Process, The 7th World Multiconference on Systemics, Cybernetics and Informatics. Vol. VI. Orlando, Florida, USA. (2003). pp.22-27.
-
(2003)
The 7th World Multiconference on Systemics, Cybernetics and Informatics
, vol.6
, pp. 22-27
-
-
Artelsmair, C.1
Wagner, R.2
-
3
-
-
33644553339
-
Security in business process engineering
-
LNCS. Eindhoven, The Netherlands
-
Backes, M., Pfitzmann, B. and Waider, M.; Security in Business Process Engineering, International Conference on Business Process Management (BPM). Vol. 2678, LNCS. Eindhoven, The Netherlands. (2003). pp.168-183.
-
(2003)
International Conference on Business Process Management (BPM)
, vol.2678
, pp. 168-183
-
-
Backes, M.1
Pfitzmann, B.2
Waider, M.3
-
4
-
-
0242625201
-
Model driven security for process-oriented systems
-
Villa Gallia, Como, Italy
-
Basin, D., Doser, J. and Lodderstedt, T.; Model driven security for process-oriented systems, SACMAT 2003, 8th ACM Symposium on Access Control Models and Technologies. Villa Gallia, Como, Italy. (2003).
-
(2003)
SACMAT 2003, 8th ACM Symposium on Access Control Models and Technologies
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
5
-
-
0141461213
-
UML 2 activity and action models
-
July-August
-
Bock, C.; UML 2 Activity and Action Models, Journal of Object Technology. Vol. 2 (4), July-August. (2003). pp.43-53.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.4
, pp. 43-53
-
-
Bock, C.1
-
7
-
-
2942757657
-
Engineering security requirements
-
January-February
-
Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
8
-
-
2942753973
-
Specifying reusable security requirements
-
January-February
-
Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
13
-
-
33750037373
-
UML business modeling profile
-
Vilnius, Lithuania.
-
Kalnins, A., Barzdins, J. and Celms, E.; UML Business Modeling Profile, Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education. Vilnius, Lithuania. (2004). pp.182-194.
-
(2004)
Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education
, pp. 182-194
-
-
Kalnins, A.1
Barzdins, J.2
Celms, E.3
-
15
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Dresden, Germany
-
Lodderstedt, T., Basin, D. and Doser, J.; SecureUML: A UML-Based Modeling Language for Model-Driven Security, The Unified Modeling Language, 5th International Conference. Vol. 2460. Dresden, Germany. (2002). pp.426-441.
-
(2002)
The Unified Modeling Language, 5th International Conference
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
16
-
-
17744394269
-
Specification and design of advanced authentication and authorization services
-
Lopez, J., Montenegro, J. A., Vivas, J. L., Okamoto, E. and Dawson, E.; Specification and design of advanced authentication and authorization services, Computer Standards & Interfaces. Vol. 27 (5). (2005). pp.467-478.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 467-478
-
-
Lopez, J.1
Montenegro, J.A.2
Vivas, J.L.3
Okamoto, E.4
Dawson, E.5
-
17
-
-
33750048791
-
A business process-driven approach to security engineering
-
Prague, Czech Republic
-
Maña, A., Montenegro, J. A., Rudolph, C. and Vivas, J. L.; A business process-driven approach to security engineering, 14th. International Workshop on Database and Expert Systems Applications (DEXA). Prague, Czech Republic. (2003). pp.477-481.
-
(2003)
14th. International Workshop on Database and Expert Systems Applications (DEXA)
, pp. 477-481
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
18
-
-
33750073251
-
Integrando la ingeniería de seguridad en un proceso de ingeniería software
-
Leganés, Madrid. España
-
Maña, A., Ray, D., Sánchez, F. and Yagüe, M. I.; Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software, VIII Reunión Española de Criptología y Seguridad de la Información, RECSI. Leganés, Madrid. España. (2004). pp.383-392.
-
(2004)
VIII Reunión Española de Criptología y Seguridad de la Información, RECSI
, pp. 383-392
-
-
Maña, A.1
Ray, D.2
Sánchez, F.3
Yagüe, M.I.4
-
19
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
Mouratidis, H., Giorgini, P. and Manson, G. A.; When security meets software engineering: a case of modelling secure information systems, Information Systems. Vol. 30 (8). (2005). pp.609-629.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
22
-
-
33750060100
-
Survivability and business continuity management
-
Dunedin, New Zealand
-
Quirchmayr, G.; Survivability and Business Continuity Management, ACSW Frontiers 2004 Workshops. Dunedin, New Zealand. (2004). pp.3-6.
-
(2004)
ACSW Frontiers 2004 Workshops
, pp. 3-6
-
-
Quirchmayr, G.1
-
23
-
-
84942786976
-
A language for modelling secure business transactions
-
Phoenix, Arizona.
-
Röhm, A. W., Herrmann, G. and Pernul, G.; A Language for Modelling Secure Business Transactions, 15th. Annual Computer Security Applications Conference. Phoenix, Arizona. (1999). pp.22-31.
-
(1999)
15th. Annual Computer Security Applications Conference
, pp. 22-31
-
-
Röhm, A.W.1
Herrmann, G.2
Pernul, G.3
-
24
-
-
84963689748
-
Modelling secure and fair electronic commerce
-
Scottsdale, Arizona.
-
Röhm, A. W., Pernul, G. and Hermann, G.; Modelling Secure and Fair Electronic Commerce, 14th. Annual Computer Security Applications Conference. Scottsdale, Arizona. (1998). pp.155-164.
-
(1998)
14th. Annual Computer Security Applications Conference
, pp. 155-164
-
-
Röhm, A.W.1
Pernul, G.2
Hermann, G.3
-
25
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
Siponen, M. T.; Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods, Information and Organization. Vol. 15. (2005). pp.339-375.
-
(2005)
Information and Organization
, vol.15
, pp. 339-375
-
-
Siponen, M.T.1
-
26
-
-
33750062930
-
Extending UML 2 activity diagrams with business intelligence objects
-
Copenhagen, Denmark
-
Stefanov, V., List, B. and Korherr, B.; Extending UML 2 Activity Diagrams with Business Intelligence Objects, 7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005). Copenhagen, Denmark. (2005).
-
(2005)
7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005)
-
-
Stefanov, V.1
List, B.2
Korherr, B.3
-
27
-
-
35248832632
-
Towards a business process-driven framework for security engineering with the UML
-
Bristol, U.K.
-
Vivas, J. L., Montenegro, J. A. and Lopez, J.; Towards a Business Process-Driven Framework for security Engineering with the UML, Information Security: 6th International Conference, ISC. Bristol, U.K. (2003). pp.381-395.
-
(2003)
Information Security: 6th International Conference, ISC
, pp. 381-395
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
-
28
-
-
33845206869
-
Software security engineering: Toward unifying software engineering and security engineering
-
Idea Group (Ed.), M. Warkentin & R. Vaughn
-
Zulkernine, M. and Ahamed, S. I., Software Security Engineering: Toward Unifying Software Engineering and Security Engineering, in: Idea Group (Ed.), Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, M. Warkentin & R. Vaughn, 2006, p.215-232.
-
(2006)
Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues
, pp. 215-232
-
-
Zulkernine, M.1
Ahamed, S.I.2
|