-
1
-
-
0037240812
-
Misuse Cases: Use Cases with Hostile Intent
-
Alexander, I.F.: Misuse Cases: Use Cases with Hostile Intent, IEEE Software. IEEE Software 20(1), 58-66 (2003)
-
(2003)
IEEE Software. IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.F.1
-
2
-
-
33644553339
-
-
Backes, M., Pfitzmann, B., Waider, M.: Security in Business Process Engineering. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, 2678, pp. 168-183. Springer, Heidelberg (2003)
-
Backes, M., Pfitzmann, B., Waider, M.: Security in Business Process Engineering. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168-183. Springer, Heidelberg (2003)
-
-
-
-
3
-
-
38049156322
-
-
BPMN: Business Process Modeling Notation Specification, OMG Final Adopted Specification, dtc/06-02-01 (2006), In http://www.bpmn.org/Documents/ OMG%20Final%20-Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf
-
BPMN: Business Process Modeling Notation Specification, OMG Final Adopted Specification, dtc/06-02-01 (2006), In http://www.bpmn.org/Documents/ OMG%20Final%20-Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf
-
-
-
-
4
-
-
84904165701
-
An Algorithm to Derive Use Cases from Business Processes
-
Boston, USA, pp
-
Dijkman, R.M., Joosten, S.M.M.: An Algorithm to Derive Use Cases from Business Processes. In: 6th International Conference on Software Engineering and Applications (SEA). Boston, USA, pp. 679-684 (2002)
-
(2002)
6th International Conference on Software Engineering and Applications (SEA)
, pp. 679-684
-
-
Dijkman, R.M.1
Joosten, S.M.M.2
-
6
-
-
2942753973
-
Specifying Reusable Security Requirements
-
Firesmith, D.: Specifying Reusable Security Requirements. Journal of Object Technology 3(1), 61-75 (2004)
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
8
-
-
33749367621
-
Security requirement analysis of business processes
-
Herrmann, P., Herrmann, G.: Security requirement analysis of business processes. Electronic Commerce Research 6(3-4), 305-335 (2006)
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.3-4
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
9
-
-
0003902726
-
-
Jacobson, I., Booch, G., Rumbaugh, J.: The Unified Software Development Process, p. 463 (1999)
-
(1999)
The Unified Software Development Process
, pp. 463
-
-
Jacobson, I.1
Booch, G.2
Rumbaugh, J.3
-
10
-
-
0036037169
-
-
Jürjens, J.: Using UMLsec and goal trees for secure systems development. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 1026-1030. Springer, Heidelberg (2003)
-
Jürjens, J.: Using UMLsec and goal trees for secure systems development. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 1026-1030. Springer, Heidelberg (2003)
-
-
-
-
11
-
-
46249093366
-
A Framework for Business Model Driven Development
-
STEP, pp
-
Liew, P., Kontogiannis, P., Tong, T.: A Framework for Business Model Driven Development. In: 12 International Workshop on Software Technology and Engineering Practice (STEP), pp. 47-56 (2004)
-
(2004)
12 International Workshop on Software Technology and Engineering Practice
, pp. 47-56
-
-
Liew, P.1
Kontogiannis, P.2
Tong, T.3
-
12
-
-
17744394269
-
Specification and design of advanced authentication and authorization services
-
Lopez, J., Montenegro, J.A., Vivas, J.L., Okamoto, E., Dawson, E.: Specification and design of advanced authentication and authorization services. Computer Standards & Interfaces 27(5), 467-478 (2005)
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 467-478
-
-
Lopez, J.1
Montenegro, J.A.2
Vivas, J.L.3
Okamoto, E.4
Dawson, E.5
-
13
-
-
33750048791
-
-
Mafia, A., Montenegro, J.A., Rudolph, C., Vivas, J.L.: A business process-driven approach to security engineering. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, 2736, pp. 477-481. Springer, Heidelberg (2003)
-
Mafia, A., Montenegro, J.A., Rudolph, C., Vivas, J.L.: A business process-driven approach to security engineering. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 477-481. Springer, Heidelberg (2003)
-
-
-
-
14
-
-
1542700278
-
-
Object Management Group
-
Object Management Group: MDA Guide Version 1.0.1 (2003), In http://www.omg.org/docs/omg/03-06-01.pdf
-
MDA Guide Version 1.0.1
-
-
-
15
-
-
38049115649
-
-
Object Management Group: Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04 2005, In
-
Object Management Group: Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04 (2005), In http://www.omg.org/docs/formal/05-07-04. pdf
-
-
-
-
16
-
-
84944683046
-
Security-Critical System Development with Extended Use Cases
-
Chiang Mai, Thailand, pp
-
Popp, G., Jürjens, J., Wimmel, G., Breu, R.: Security-Critical System Development with Extended Use Cases. In: 10th Asia-Pacific Software Engineering Conference (APSEC). Chiang Mai, Thailand, pp. 478-487 (2003)
-
(2003)
10th Asia-Pacific Software Engineering Conference (APSEC)
, pp. 478-487
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
17
-
-
38049098416
-
-
QVT: Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, p. 204 (2005)
-
QVT: Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, p. 204 (2005)
-
-
-
-
18
-
-
34247151648
-
A BPMN Extension for the Modeling of Security Requirements in Business Processes
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE Transactions on Information and Systems E90-D(4), 745-752 (2007)
-
(2007)
IEICE Transactions on Information and Systems
, vol.E90-D
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
19
-
-
33645121958
-
A Guideline to Mapping Business Processes to UML Class Diagrams
-
Rungworawut, W., Senivongse, T.: A Guideline to Mapping Business Processes to UML Class Diagrams. WSEAS Trans, on Computers 4(11), 1526-1533 (2005)
-
(2005)
WSEAS Trans, on Computers
, vol.4
, Issue.11
, pp. 1526-1533
-
-
Rungworawut, W.1
Senivongse, T.2
-
20
-
-
58149107875
-
-
Trondheim, Norway, pp
-
Sindre, G., Opdahl, A.: Capturing Security Requirements through Misuse Cases, Norsk informatikkonferanse (NIK). Trondheim, Norway, pp. 219-230 (2001)
-
(2001)
Capturing Security Requirements through Misuse Cases, Norsk informatikkonferanse (NIK)
, pp. 219-230
-
-
Sindre, G.1
Opdahl, A.2
-
21
-
-
38049110583
-
A Description of Business Process Modeling as a Tool for Definition of Requirements Specification
-
Prague, Czech Republic, pp
-
Stolfa, S., Vondrák, I.: A Description of Business Process Modeling as a Tool for Definition of Requirements Specification. In: Systems Integration 12th Annual International Conference. Prague, Czech Republic, pp. 463-469 (2004)
-
(2004)
Systems Integration 12th Annual International Conference
, pp. 463-469
-
-
Stolfa, S.1
Vondrák, I.2
|