-
1
-
-
33644553339
-
-
Backes, M., Pfitzmann, B., Waider, M.: Security in Business Process Engineering, International Conference on Business Process Management (BPM). In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, 2678, pp. 168-183. Springer, Heidelberg (2003)
-
Backes, M., Pfitzmann, B., Waider, M.: Security in Business Process Engineering, International Conference on Business Process Management (BPM). In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168-183. Springer, Heidelberg (2003)
-
-
-
-
3
-
-
84973897721
-
Business Process Modeling with UML
-
Set-bal, Portugal
-
Castela, N., Tribolet, J., Silva, A., Guerra, A.: Business Process Modeling with UML. In: 3st. International Conference on Enterprise Information Systems, Set-bal, Portugal, vol. 2, pp. 679-685 (2001)
-
(2001)
3st. International Conference on Enterprise Information Systems
, vol.2
, pp. 679-685
-
-
Castela, N.1
Tribolet, J.2
Silva, A.3
Guerra, A.4
-
4
-
-
2942753973
-
Specifying Reusable Security Requirements
-
Firesmith, D.: Specifying Reusable Security Requirements. Journal of Object Technology 3(1), 61-75 (2004)
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
6
-
-
0039372661
-
Viewing Business Process Security from Different Perspectives
-
Slovenia, pp
-
Herrmann, G., Pernul, G.: Viewing Business Process Security from Different Perspectives. In: 11th International Bled Electronic Commerce Conference, 1998, Slovenia, pp. 89-103 (1998)
-
(1998)
11th International Bled Electronic Commerce Conference
, pp. 89-103
-
-
Herrmann, G.1
Pernul, G.2
-
7
-
-
33749367621
-
Security requirement analysis of business processes
-
Herrmann, P., Herrmann, G.: Security requirement analysis of business processes. Electronic Commerce Research 6(3-4), 305-335 (2006)
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.3-4
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
8
-
-
44649123401
-
-
Jacobson, I., Booch, G., Rumbaugh, J.: El proceso unificado de desarrollo de software, p. 464 (2000)
-
(2000)
El proceso unificado de desarrollo de software
, pp. 464
-
-
Jacobson, I.1
Booch, G.2
Rumbaugh, J.3
-
9
-
-
17744394269
-
Specification and design of advanced authentication and authorization services
-
Lopez, J., Montenegro, J.A., Vivas, J.L., Okamoto, E., Dawson, E.: Specification and design of advanced authentication and authorization services. Computer Standards & Interfaces 27(5), 467-478 (2005)
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 467-478
-
-
Lopez, J.1
Montenegro, J.A.2
Vivas, J.L.3
Okamoto, E.4
Dawson, E.5
-
10
-
-
33750048791
-
A business process-driven approach to security engineering
-
Prague, Czech Republic, pp
-
Maña, A., Montenegro, J.A., Rudolph, C., Vivas, J.L.: A business process-driven approach to security engineering. In: 14th. International Workshop on Database and Expert Systems Applications (DEXA), Prague, Czech Republic, pp. 477-481 (2003)
-
(2003)
14th. International Workshop on Database and Expert Systems Applications (DEXA)
, pp. 477-481
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
11
-
-
37249019832
-
-
Madrid. Españ, pp
-
Maña, A., Ray, D., Sánchez, F., Yagüe, M. L: Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software, VIII Reunión Española de Criptología y Seguridad de la Información, RECSI, Madrid. Españ, pp. 383-392 (2004)
-
(2004)
Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software, VIII Reunión Española de Criptología y Seguridad de la Información, RECSI
, pp. 383-392
-
-
Maña, A.1
Ray, D.2
Sánchez, F.3
Yagüe, M.L.4
-
12
-
-
33847388300
-
-
Object Management Group; Version 1.0.1
-
Object Management Group; MDA Guide Version 1.0.1. (2003), http://www.omg.org/docs/omg/03-06-01.pdf
-
(2003)
MDA Guide
-
-
-
13
-
-
37249015716
-
-
Object Management Group; Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04 2005
-
Object Management Group; Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04 (2005), http://www.omg.org/docs/formal/05-07-04.pdf
-
-
-
-
14
-
-
33750060100
-
Survivability and Business Continuity Management
-
Workshops, Dunedin, New Zealand, pp
-
Quirchmayr, G.: Survivability and Business Continuity Management. In: ACSW Frontiers 2004 Workshops, Dunedin, New Zealand, pp. 3-6 (2004)
-
(2004)
ACSW Frontiers 2004
, pp. 3-6
-
-
Quirchmayr, G.1
-
15
-
-
37249058627
-
-
QVT, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, p. 204 (2005)
-
QVT, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, p. 204 (2005)
-
-
-
-
17
-
-
33750083883
-
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
-
Fischer-Hübner, S, Furnell, S, Lambrinoudakis, C, eds, TrustBus 2006, Springer, Heidelberg
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol.4083, pp. 51-61. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4083
, pp. 51-61
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
18
-
-
84942786976
-
-
Röhm, A.W., Herrmann, G., Pernul, G.: A Language for Modelling Secure Business Transactions. In: 15th. Annual Computer Security Applications Conference, Phoenix, Arizona, pp. 22-31 (1999)
-
Röhm, A.W., Herrmann, G., Pernul, G.: A Language for Modelling Secure Business Transactions. In: 15th. Annual Computer Security Applications Conference, Phoenix, Arizona, pp. 22-31 (1999)
-
-
-
-
19
-
-
33749055181
-
A Categorization of Collaborative Business Process Modeling Techniques
-
Munchen, Germany, pp
-
Roser, S., Bauer, B.: A Categorization of Collaborative Business Process Modeling Techniques. In: 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005), Munchen, Germany, pp. 43-54 (2005)
-
(2005)
7th IEEE International Conference on E-Commerce Technology Workshops (CEC
, pp. 43-54
-
-
Roser, S.1
Bauer, B.2
-
20
-
-
37249014691
-
Using Ontology Search in the Design of Class Diagram from Business Process Model, Enformatika
-
Rungworawut, W., Senivongse, T.: Using Ontology Search in the Design of Class Diagram from Business Process Model, Enformatika, Transactions on Engineering. Computing and Technology 12, 165-170 (2006)
-
(2006)
Transactions on Engineering. Computing and Technology
, vol.12
, pp. 165-170
-
-
Rungworawut, W.1
Senivongse, T.2
-
21
-
-
84904349582
-
Perceptions of Security Contributing to the Implementation of Secure IS, Security and Privacy in the Age of Uncertainty
-
Athens, Greece
-
Tryfonas, T., Kiountouzis, E.A.: Perceptions of Security Contributing to the Implementation of Secure IS, Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), Athens, Greece, vol. 250, pp. 313-324 (2003)
-
(2003)
IFIP TC11 18th International Conference on Information Security (SEC2003)
, vol.250
, pp. 313-324
-
-
Tryfonas, T.1
Kiountouzis, E.A.2
|