-
2
-
-
33750060100
-
Survivability and business continuity management
-
Workshops, Dunedin, New Zealand
-
G. Quirchmayr, "Survivability and business continuity management," ACSW Frontiers 2004 Workshops, Dunedin, New Zealand, 2004.
-
(2004)
ACSW Frontiers 2004
-
-
Quirchmayr, G.1
-
3
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
A. Zuccato, "Holistic security requirement engineering for electronic commerce," Computers & Security, vol.23, no.1, pp.63-76, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63-76
-
-
Zuccato, A.1
-
4
-
-
33750066700
-
Security in business process engineering
-
Eindhoven, The Netherlands
-
M. Backes, B. Pfitzmann, and M. Waider, "Security in business process engineering," International Conference on Business Process Management (BPM), Eindhoven, The Netherlands, 2003.
-
(2003)
International Conference on Business Process Management (BPM)
-
-
Backes, M.1
Pfitzmann, B.2
Waider, M.3
-
6
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
H. Mouratidis, P. Giorgini, and G.A. Manson, "When security meets software engineering: A case of modelling secure information systems," Information Systems, vol.30, no.8, pp.609-629, 2005.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
7
-
-
17744394269
-
Specification and design of advanced authentication and authorization services
-
J. Lopez, J.A. Montenegro, J.L. Vivas, E. Okamoto, and E. Dawson, "Specification and design of advanced authentication and authorization services," Computer Standards & Interfaces, vol.27, no.5, pp.467-478, 2005.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 467-478
-
-
Lopez, J.1
Montenegro, J.A.2
Vivas, J.L.3
Okamoto, E.4
Dawson, E.5
-
8
-
-
2942757657
-
-
D. Firesmith, Engineering security requirements, J. Object Technology, 2, no.1, Jan.-Feb., pp.53-68, 2003.
-
D. Firesmith, "Engineering security requirements," J. Object Technology, vol.2, no.1, Jan.-Feb., pp.53-68, 2003.
-
-
-
-
9
-
-
33750059814
-
Towards a security engineering process
-
Orlando, Florida, USA
-
C. Artelsmair and R. Wagner, "Towards a security engineering process," The 7th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, 2003.
-
(2003)
The 7th World Multiconference on Systemics, Cybernetics and Informatics
-
-
Artelsmair, C.1
Wagner, R.2
-
11
-
-
0035300743
-
A taxonomy of business process modelling and information systems modelling techniques
-
G.M. Giaglis, "A taxonomy of business process modelling and information systems modelling techniques," Int. J. Flexible Manufacturing Systems, vol.13, no.2, pp.209-228, 2001.
-
(2001)
Int. J. Flexible Manufacturing Systems
, vol.13
, Issue.2
, pp. 209-228
-
-
Giaglis, G.M.1
-
14
-
-
85027094425
-
-
BPMN, Business process modeling notation specification, OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf, 2006.
-
BPMN, "Business process modeling notation specification," OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf, 2006.
-
-
-
-
15
-
-
77953980176
-
-
MDA Journal
-
D.S. Frankel, "BPMI and OMG: The BPM merger," MDA Journal. In http://www.bptrends.com/publicationfiles/02-06%20COL%20MDA%20BPMI-OMG%20- %20Frankell.pdf, 2006.
-
(2006)
BPMI and OMG: The BPM merger
-
-
Frankel, D.S.1
-
16
-
-
0242655790
-
SecureUML: A UML-based modeling language for model-driven security
-
Dresden, Germany
-
T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-based modeling language for model-driven security," The Unified Modeling Language, 5th International Conference, Dresden, Germany, 2002.
-
(2002)
The Unified Modeling Language, 5th International Conference
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
17
-
-
34247114551
-
-
VIII Reunión Española de Criptología y Seguridad de la Información, RECSI, Leganés, Madrid, España
-
A. Maña, D. Ray, F. Sánchez, and M.I. Yagüe, "Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software," VIII Reunión Española de Criptología y Seguridad de la Información, RECSI, Leganés, Madrid, España, 2004.
-
(2004)
Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software
-
-
Maña, A.1
Ray, D.2
Sánchez, F.3
Yagüe, M.I.4
-
18
-
-
84963689748
-
Modelling secure and fair electronic commerce
-
Scottsdale, Arizona
-
A.W. Rohm, G. Pernul, and G. Herrmann, "Modelling secure and fair electronic commerce," 14th Annual Computer Security Applications Conference, Scottsdale, Arizona, 1998.
-
(1998)
14th Annual Computer Security Applications Conference
-
-
Rohm, A.W.1
Pernul, G.2
Herrmann, G.3
-
19
-
-
14244261953
-
Towards a business process-driven framework for security engineering with the UML
-
ISC, Bristol, U.K
-
J.L. Vivas, J.A. Montenegro, and J. Lopez, "Towards a business process-driven framework for security engineering with the UML," Information Security: 6th International Conference, ISC, Bristol, U.K., 2003.
-
(2003)
Information Security: 6th International Conference
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
-
20
-
-
33750048791
-
A business process-driven approach to security engineering
-
Prague, Czech Republic
-
A. Maña, J.A. Montenegro, C. Rudolph, and J.L. Vivas, "A business process-driven approach to security engineering," 14th International Workshop on Database and Expert Systems Applications (DEXA), Prague, Czech Republic, 2003.
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA)
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
21
-
-
84942786976
-
A language for modelling secure business transactions
-
Phoenix, Arizona
-
A.W. Rohm, G. Herrmann, and G. Pernul, "A language for modelling secure business transactions," 15th Annual Computer Security Applications Conference, Phoenix, Arizona, 1999.
-
(1999)
15th Annual Computer Security Applications Conference
-
-
Rohm, A.W.1
Herrmann, G.2
Pernul, G.3
-
22
-
-
34247117568
-
Integrating a security requirement language with UML
-
Lisbon, Portugal
-
H. Abie, D.B. Aredo, T. Kristoffersen, S. Mazaher, and T. Raguin, "Integrating a security requirement language with UML," 7th International Conference, The UML: Modelling Languages and Applications, Lisbon, Portugal, 2004.
-
(2004)
7th International Conference, The UML: Modelling Languages and Applications
-
-
Abie, H.1
Aredo, D.B.2
Kristoffersen, T.3
Mazaher, S.4
Raguin, T.5
-
23
-
-
85027111276
-
-
J. Jürjens, Towards development of secure systems using UMLsec, Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001, Genova, Italy, 2001.
-
J. Jürjens, "Towards development of secure systems using UMLsec," Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001, Genova, Italy, 2001.
-
-
-
-
25
-
-
0242625201
-
Model driven security for process-oriented systems
-
Como, Italy
-
D. Basin, J. Doser, and T. Lodderstedt, "Model driven security for process-oriented systems," SACMAT 2003, 8th ACM Symposium on Access Control Models and Technologies, Villa Gallia, Como, Italy, 2003.
-
(2003)
SACMAT 2003, 8th ACM Symposium on Access Control Models and Technologies, Villa Gallia
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
26
-
-
35048845022
-
Integrating security and systems engineering: Towards the modelling of secure information systems
-
Klagenfurt, Austria, June
-
H. Mouratidis, P. Giorgini, and G.A. Manson, "Integrating security and systems engineering: Towards the modelling of secure information systems," Advanced Information Systems Engineering, 15th International Conference, CAiSE 2003, Proceedings, vol.2681, pp.63-78, Klagenfurt, Austria, June 2003.
-
(2003)
Advanced Information Systems Engineering, 15th International Conference, CAiSE 2003, Proceedings
, vol.2681
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
27
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
M.T. Siponen, "Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods," Information and Organization, vol.15, pp.339-375, 2005.
-
(2005)
Information and Organization
, vol.15
, pp. 339-375
-
-
Siponen, M.T.1
-
28
-
-
33845206869
-
-
M. Zulkernine and S.I. Ahamed, Software security engineering: Toward unifying software engineering and security engineering, in Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, Idea Group, ed. M. Warkentin and R. Vaughn, pp.215-232, 2006.
-
M. Zulkernine and S.I. Ahamed, "Software security engineering: Toward unifying software engineering and security engineering," in Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, Idea Group, ed. M. Warkentin and R. Vaughn, pp.215-232, 2006.
-
-
-
-
29
-
-
2942753973
-
Specifying reusable security requirements
-
Jan.-Feb
-
D. Firesmith, "Specifying reusable security requirements," Journal of Object Technology, vol.3, no.1, pp.61-75, Jan.-Feb. 2004.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
30
-
-
84973897721
-
Business process modeling with UML
-
Setubal, Portugal
-
N. Castela, J. Tribolet, A. Silva, and A. Guerra, "Business process modeling with UML," Proc. 3rd International Conference on Enterprise Information Systems, Setubal, Portugal, 2001.
-
(2001)
Proc. 3rd International Conference on Enterprise Information Systems
-
-
Castela, N.1
Tribolet, J.2
Silva, A.3
Guerra, A.4
-
37
-
-
33746423872
-
-
Object Management Group
-
Object Management Group, "OCL 2.0 specification, version 2.0," in http://www.omg.org/docs/ptc/05-06-06.pdf, 2005.
-
(2005)
OCL 2.0 specification, version 2.0
-
-
|