메뉴 건너뛰기




Volumn 4657 LNCS, Issue , 2007, Pages 104-114

Analysis-level classes from secure business processes through model transformations

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; MATHEMATICAL MODELS; MATHEMATICAL TRANSFORMATIONS; SECURITY OF DATA; SPECIFICATIONS;

EID: 37249076412     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74409-2_13     Document Type: Conference Paper
Times cited : (20)

References (21)
  • 1
    • 33644553339 scopus 로고    scopus 로고
    • Backes, M., Pfitzmann, B., Waider, M.: Security in Business Process Engineering, International Conference on Business Process Management (BPM). In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, 2678, pp. 168-183. Springer, Heidelberg (2003)
    • Backes, M., Pfitzmann, B., Waider, M.: Security in Business Process Engineering, International Conference on Business Process Management (BPM). In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168-183. Springer, Heidelberg (2003)
  • 4
    • 2942753973 scopus 로고    scopus 로고
    • Specifying Reusable Security Requirements
    • Firesmith, D.: Specifying Reusable Security Requirements. Journal of Object Technology 3(1), 61-75 (2004)
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 7
    • 33749367621 scopus 로고    scopus 로고
    • Security requirement analysis of business processes
    • Herrmann, P., Herrmann, G.: Security requirement analysis of business processes. Electronic Commerce Research 6(3-4), 305-335 (2006)
    • (2006) Electronic Commerce Research , vol.6 , Issue.3-4 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2
  • 12
    • 33847388300 scopus 로고    scopus 로고
    • Object Management Group; Version 1.0.1
    • Object Management Group; MDA Guide Version 1.0.1. (2003), http://www.omg.org/docs/omg/03-06-01.pdf
    • (2003) MDA Guide
  • 13
    • 37249015716 scopus 로고    scopus 로고
    • Object Management Group; Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04 2005
    • Object Management Group; Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04 (2005), http://www.omg.org/docs/formal/05-07-04.pdf
  • 14
    • 33750060100 scopus 로고    scopus 로고
    • Survivability and Business Continuity Management
    • Workshops, Dunedin, New Zealand, pp
    • Quirchmayr, G.: Survivability and Business Continuity Management. In: ACSW Frontiers 2004 Workshops, Dunedin, New Zealand, pp. 3-6 (2004)
    • (2004) ACSW Frontiers 2004 , pp. 3-6
    • Quirchmayr, G.1
  • 15
    • 37249058627 scopus 로고    scopus 로고
    • QVT, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, p. 204 (2005)
    • QVT, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, p. 204 (2005)
  • 17
    • 33750083883 scopus 로고    scopus 로고
    • Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
    • Fischer-Hübner, S, Furnell, S, Lambrinoudakis, C, eds, TrustBus 2006, Springer, Heidelberg
    • Rodríguez, A., Fernández-Medina, E., Piattini, M.: Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol.4083, pp. 51-61. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4083 , pp. 51-61
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 18
    • 84942786976 scopus 로고    scopus 로고
    • Röhm, A.W., Herrmann, G., Pernul, G.: A Language for Modelling Secure Business Transactions. In: 15th. Annual Computer Security Applications Conference, Phoenix, Arizona, pp. 22-31 (1999)
    • Röhm, A.W., Herrmann, G., Pernul, G.: A Language for Modelling Secure Business Transactions. In: 15th. Annual Computer Security Applications Conference, Phoenix, Arizona, pp. 22-31 (1999)
  • 20
    • 37249014691 scopus 로고    scopus 로고
    • Using Ontology Search in the Design of Class Diagram from Business Process Model, Enformatika
    • Rungworawut, W., Senivongse, T.: Using Ontology Search in the Design of Class Diagram from Business Process Model, Enformatika, Transactions on Engineering. Computing and Technology 12, 165-170 (2006)
    • (2006) Transactions on Engineering. Computing and Technology , vol.12 , pp. 165-170
    • Rungworawut, W.1    Senivongse, T.2
  • 21
    • 84904349582 scopus 로고    scopus 로고
    • Perceptions of Security Contributing to the Implementation of Secure IS, Security and Privacy in the Age of Uncertainty
    • Athens, Greece
    • Tryfonas, T., Kiountouzis, E.A.: Perceptions of Security Contributing to the Implementation of Secure IS, Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), Athens, Greece, vol. 250, pp. 313-324 (2003)
    • (2003) IFIP TC11 18th International Conference on Information Security (SEC2003) , vol.250 , pp. 313-324
    • Tryfonas, T.1    Kiountouzis, E.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.