메뉴 건너뛰기




Volumn E90-D, Issue 4, 2007, Pages 745-752

A BPMN extension for the modeling of security requirements in business processes

Author keywords

BPMN; Business process; Security requirement

Indexed keywords

COMMERCE; HEALTH CARE; SECURITY OF DATA;

EID: 34247151648     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1093/ietisy/e90-d.4.745     Document Type: Article
Times cited : (260)

References (38)
  • 2
    • 33750060100 scopus 로고    scopus 로고
    • Survivability and business continuity management
    • Workshops, Dunedin, New Zealand
    • G. Quirchmayr, "Survivability and business continuity management," ACSW Frontiers 2004 Workshops, Dunedin, New Zealand, 2004.
    • (2004) ACSW Frontiers 2004
    • Quirchmayr, G.1
  • 3
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • A. Zuccato, "Holistic security requirement engineering for electronic commerce," Computers & Security, vol.23, no.1, pp.63-76, 2004.
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 63-76
    • Zuccato, A.1
  • 6
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • H. Mouratidis, P. Giorgini, and G.A. Manson, "When security meets software engineering: A case of modelling secure information systems," Information Systems, vol.30, no.8, pp.609-629, 2005.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 8
    • 2942757657 scopus 로고    scopus 로고
    • D. Firesmith, Engineering security requirements, J. Object Technology, 2, no.1, Jan.-Feb., pp.53-68, 2003.
    • D. Firesmith, "Engineering security requirements," J. Object Technology, vol.2, no.1, Jan.-Feb., pp.53-68, 2003.
  • 11
    • 0035300743 scopus 로고    scopus 로고
    • A taxonomy of business process modelling and information systems modelling techniques
    • G.M. Giaglis, "A taxonomy of business process modelling and information systems modelling techniques," Int. J. Flexible Manufacturing Systems, vol.13, no.2, pp.209-228, 2001.
    • (2001) Int. J. Flexible Manufacturing Systems , vol.13 , Issue.2 , pp. 209-228
    • Giaglis, G.M.1
  • 14
    • 85027094425 scopus 로고    scopus 로고
    • BPMN, Business process modeling notation specification, OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf, 2006.
    • BPMN, "Business process modeling notation specification," OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf, 2006.
  • 15
    • 77953980176 scopus 로고    scopus 로고
    • MDA Journal
    • D.S. Frankel, "BPMI and OMG: The BPM merger," MDA Journal. In http://www.bptrends.com/publicationfiles/02-06%20COL%20MDA%20BPMI-OMG%20- %20Frankell.pdf, 2006.
    • (2006) BPMI and OMG: The BPM merger
    • Frankel, D.S.1
  • 23
    • 85027111276 scopus 로고    scopus 로고
    • J. Jürjens, Towards development of secure systems using UMLsec, Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001, Genova, Italy, 2001.
    • J. Jürjens, "Towards development of secure systems using UMLsec," Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001, Genova, Italy, 2001.
  • 27
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • M.T. Siponen, "Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods," Information and Organization, vol.15, pp.339-375, 2005.
    • (2005) Information and Organization , vol.15 , pp. 339-375
    • Siponen, M.T.1
  • 28
    • 33845206869 scopus 로고    scopus 로고
    • M. Zulkernine and S.I. Ahamed, Software security engineering: Toward unifying software engineering and security engineering, in Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, Idea Group, ed. M. Warkentin and R. Vaughn, pp.215-232, 2006.
    • M. Zulkernine and S.I. Ahamed, "Software security engineering: Toward unifying software engineering and security engineering," in Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, Idea Group, ed. M. Warkentin and R. Vaughn, pp.215-232, 2006.
  • 29
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Jan.-Feb
    • D. Firesmith, "Specifying reusable security requirements," Journal of Object Technology, vol.3, no.1, pp.61-75, Jan.-Feb. 2004.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 37
    • 33746423872 scopus 로고    scopus 로고
    • Object Management Group
    • Object Management Group, "OCL 2.0 specification, version 2.0," in http://www.omg.org/docs/ptc/05-06-06.pdf, 2005.
    • (2005) OCL 2.0 specification, version 2.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.