-
2
-
-
38949214022
-
-
Ediciones Multimedia, 2006, 608 p
-
Arlow, J. and Neustadt, I., UML 2, Ediciones Anaya Multimedia, (2006). 608 p.
-
UML 2
-
-
Arlow, J.1
Neustadt, I.2
-
3
-
-
33750059814
-
Towards a Security Engineering Process
-
Orlando, Florida, USA
-
Artelsmair, C. and Wagner, R.; Towards a Security Engineering Process, The 7th World Multiconference on Systemics, Cybernetics and Informatics. Vol. VI. Orlando, Florida, USA. (2003). pp.22-27.
-
(2003)
The 7th World Multiconference on Systemics, Cybernetics and Informatics
, vol.6
, pp. 22-27
-
-
Artelsmair, C.1
Wagner, R.2
-
4
-
-
33644553339
-
Security in Business Process Engineering
-
International Conference on Business Process Management BPM, Eindhoven, The Netherlands
-
Backes, M., Pfitzmann, B. and Waider, M.; Security in Business Process Engineering, International Conference on Business Process Management (BPM). Vol. 2678, LNCS. Eindhoven, The Netherlands. (2003). pp. 168-183.
-
(2003)
LNCS
, vol.2678
, pp. 168-183
-
-
Backes, M.1
Pfitzmann, B.2
Waider, M.3
-
5
-
-
0242625201
-
Model driven security for process-oriented systems
-
Como, Italy
-
Basin, D., Doser, J. and Lodderstedt, T.; Model driven security for process-oriented systems, SACMAT 2003, 8th ACM Symposium on Access Control Models and Technologies. Villa Gallia, Como, Italy. (2003).
-
(2003)
SACMAT 2003, 8th ACM Symposium on Access Control Models and Technologies. Villa Gallia
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
7
-
-
0141461213
-
UML 2 Activity and Action Models
-
July-August
-
Bock, C.; UML 2 Activity and Action Models, Journal of Object Technology. Vol. 2 (4), July-August. (2003). pp.43-53.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.4
, pp. 43-53
-
-
Bock, C.1
-
8
-
-
2942735594
-
UML 2 Activity and Action Models, Part2: Actions
-
September-October
-
Bock, C.; UML 2 Activity and Action Models, Part2: Actions, Journal of Object Technology. Vol. 2 (5), September-October. (2003). pp.41-56.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.5
, pp. 41-56
-
-
Bock, C.1
-
9
-
-
33749599831
-
-
BPMN;, OMG Final Adopted Specification, dtc/06-02-01
-
BPMN; Business Process Modeling Notation Specification, OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf. (2006).
-
(2006)
Business Process Modeling Notation Specification
-
-
-
10
-
-
84973897721
-
Business Process Modeling with UML
-
Set-bal, Portugal
-
Castela, N., Tribolet, J., Silva, A. and Guerra, A.; Business Process Modeling with UML, Proceedings of the 3st. International Conference on Enterprise Information Systems. Vol. 2. Set-bal, Portugal. (2001). pp.679-685.
-
(2001)
Proceedings of the 3st. International Conference on Enterprise Information Systems
, vol.2
, pp. 679-685
-
-
Castela, N.1
Tribolet, J.2
Silva, A.3
Guerra, A.4
-
12
-
-
2942757657
-
Engineering Security Requirements
-
January-February
-
Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
13
-
-
2942753973
-
Specifying Reusable Security Requirements
-
January-February
-
Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
15
-
-
0035300743
-
A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques
-
Giaglis, G. M.; A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques, International Journal of Flexible Manufacturing Systems. Vol. 13 (2). (2001). pp.209-228.
-
(2001)
International Journal of Flexible Manufacturing Systems
, vol.13
, Issue.2
, pp. 209-228
-
-
Giaglis, G.M.1
-
17
-
-
0003826814
-
-
Sage Publication Inc, First Edition, 320 p
-
Hunt, S., A General Theory of Competition: Resources, Competences, Productivity, Economic Growth, Sage Publication Inc., First Edition, (2000). 320 p.
-
(2000)
A General Theory of Competition: Resources, Competences, Productivity, Economic Growth
-
-
Hunt, S.1
-
19
-
-
84944220091
-
-
Jürjens, J.; Towards Development of Secure Systems Using UMLsec, Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001. 2029. Genova, Italy. (2001). pp. 187-200.
-
Jürjens, J.; Towards Development of Secure Systems Using UMLsec, Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001. Vol. 2029. Genova, Italy. (2001). pp. 187-200.
-
-
-
-
22
-
-
33750037373
-
UML Business Modeling Profile
-
Practice and Education. Vilnius, Lithuania
-
Kalnins, A., Barzdins, J. and Celms, E.; UML Business Modeling Profile, Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education. Vilnius, Lithuania. (2004). pp.182-194.
-
(2004)
Thirteenth International Conference on Information Systems Development, Advances in Theory
, pp. 182-194
-
-
Kalnins, A.1
Barzdins, J.2
Celms, E.3
-
24
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Dresden, Germany
-
Lodderstedt, T., Basin, D. and Doser, J.; SecureUML: A UML-Based Modeling Language for Model-Driven Security, The Unified Modeling Language, 5th International Conference. Vol. 2460. Dresden, Germany. (2002). pp.426-441.
-
(2002)
The Unified Modeling Language, 5th International Conference
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
26
-
-
17744394269
-
Specification and design of advanced authentication and authorization services
-
Lopez, J., Montenegro, J. A., Vivas, J. L., Okamoto, E. and Dawson, E.; Specification and design of advanced authentication and authorization services, Computer Standards & Interfaces. Vol. 27 (5). (2005). pp.467-478.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 467-478
-
-
Lopez, J.1
Montenegro, J.A.2
Vivas, J.L.3
Okamoto, E.4
Dawson, E.5
-
27
-
-
33750048791
-
A business process-driven approach to security engineering
-
Prague, Czech Republic
-
Maña, A., Montenegro, J. A., Rudolph, C. and Vivas, J. L.; A business process-driven approach to security engineering, 14th. International Workshop on Database and Expert Systems Applications (DEXA). Prague, Czech Republic. (2003). pp.477-481.
-
(2003)
14th. International Workshop on Database and Expert Systems Applications (DEXA)
, pp. 477-481
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
28
-
-
37249019832
-
-
Leganés, Madrid. España
-
Maña, A., Ray, D., Sánchez, F. and Yagüe, M. I.; Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software, VIII Reunión Española de Criptología y Seguridad de la Información, RECSI. Leganés, Madrid. España. (2004). pp.383-392.
-
(2004)
Integrando la Ingeniería de Seguridad en un Proceso de Ingeniería Software, VIII Reunión Española de Criptología y Seguridad de la Información, RECSI
, pp. 383-392
-
-
Maña, A.1
Ray, D.2
Sánchez, F.3
Yagüe, M.I.4
-
30
-
-
35048845022
-
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
-
Mouratidis, H., Giorgini, P. and Manson, G. A.; Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems, Advanced Information Systems Engineering, 15th International Conference, CAiSE 2003, Klagenfurt, Austria, June 16-18, 2003, Proceedings. Vol. 2681. (2003). pp.63-78.
-
(2003)
Advanced Information Systems Engineering, 15th International Conference, CAiSE 2003, Klagenfurt, Austria, June 16-18, 2003, Proceedings
, vol.2681
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
31
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
Mouratidis, H., Giorgini, P. and Manson, G. A.; When security meets software engineering: a case of modelling secure information systems. Information Systems. Vol. 30 (8). (2005). pp.609-629.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
32
-
-
1542700278
-
-
Object Management Group; MDA Guide Version 1.0.1. In http://www.omg.org/docs/omg/03-06-01.pdf. (2003).
-
(2003)
MDA Guide Version 1.0.1
-
-
-
33
-
-
38949150740
-
-
Object Management Group; Unified Modeling Language: Super-structure, version 2.0, formal/05-07-04. In, 2005
-
Object Management Group; Unified Modeling Language: Super-structure, version 2.0, formal/05-07-04. In http://www.omg.org/-docs/ formal/05-07-04.pdf. (2005).
-
-
-
-
37
-
-
84963689748
-
Modelling Secure and Fair Electronic Commerce
-
Scottsdale, Arizona
-
Röhm, A. W., Pernul, G. and Herrmann, G.; Modelling Secure and Fair Electronic Commerce, 14th. Annual Computer Security Applications Conference. Scottsdale, Arizona. (1998). pp. 155-164.
-
(1998)
14th. Annual Computer Security Applications Conference
, pp. 155-164
-
-
Röhm, A.W.1
Pernul, G.2
Herrmann, G.3
-
38
-
-
33749055181
-
-
Roser, S. and Bauer, B.; A Categorization of Collaborative Business Process Modeling Techniques, 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005). Munchen, Germany. (2005). pp.43-54.
-
Roser, S. and Bauer, B.; A Categorization of Collaborative Business Process Modeling Techniques, 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005). Munchen, Germany. (2005). pp.43-54.
-
-
-
-
39
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
Siponen, M. T.; Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods. Information and Organization. Vol. 15. (2005). pp.339-375.
-
(2005)
Information and Organization
, vol.15
, pp. 339-375
-
-
Siponen, M.T.1
-
41
-
-
33750062930
-
Extending UML 2 Activity Diagrams with Business Intelligence Objects
-
Copenhagen, Denmark
-
Stefanov, V., List, B. and Korherr, B.; Extending UML 2 Activity Diagrams with Business Intelligence Objects, 7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005). Copenhagen, Denmark. (2005).
-
(2005)
7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005)
-
-
Stefanov, V.1
List, B.2
Korherr, B.3
-
42
-
-
35248832632
-
Towards a Business Process-Driven Framework for security Engineering with the UML
-
ISC. Bristol, U.K
-
Vivas, J. L., Montenegro, J. A. and Lopez, J.; Towards a Business Process-Driven Framework for security Engineering with the UML, Information Security: 6th International Conference, ISC. Bristol, U.K. (2003). pp.381-395.
-
(2003)
Information Security: 6th International Conference
, pp. 381-395
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
-
43
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
Zuccato, A.; Holistic security requirement engineering for electronic commerce, Computers & Security. Vol. 23 (1). (2004). pp.63-76.
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63-76
-
-
Zuccato, A.1
-
44
-
-
33845206869
-
-
Zulkernine, M. and Ahamed, S. I., Software Security Engineering: Toward Unifying Software Engineering and Security Engineering, in: Idea Group (Ed.), Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, M. Warkentin & R. Vaughn, 2006, p.215-232.
-
Zulkernine, M. and Ahamed, S. I., Software Security Engineering: Toward Unifying Software Engineering and Security Engineering, in: Idea Group (Ed.), Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, M. Warkentin & R. Vaughn, 2006, p.215-232.
-
-
-
|