메뉴 건너뛰기




Volumn 22, Issue 5, 2007, Pages 307-319

An MDA approach to develop secure business processes through a UML 2.0 extension

Author keywords

Activity diagrams; Business process; Security requirement; UML

Indexed keywords

COMPUTER SOFTWARE; FINANCE; PHASE DIAGRAMS; PROBLEM SOLVING; PROCESS CONTROL; SECURITY OF DATA;

EID: 38949100023     PISSN: 02676192     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (44)
  • 2
    • 38949214022 scopus 로고    scopus 로고
    • Ediciones Multimedia, 2006, 608 p
    • Arlow, J. and Neustadt, I., UML 2, Ediciones Anaya Multimedia, (2006). 608 p.
    • UML 2
    • Arlow, J.1    Neustadt, I.2
  • 4
    • 33644553339 scopus 로고    scopus 로고
    • Security in Business Process Engineering
    • International Conference on Business Process Management BPM, Eindhoven, The Netherlands
    • Backes, M., Pfitzmann, B. and Waider, M.; Security in Business Process Engineering, International Conference on Business Process Management (BPM). Vol. 2678, LNCS. Eindhoven, The Netherlands. (2003). pp. 168-183.
    • (2003) LNCS , vol.2678 , pp. 168-183
    • Backes, M.1    Pfitzmann, B.2    Waider, M.3
  • 7
    • 0141461213 scopus 로고    scopus 로고
    • UML 2 Activity and Action Models
    • July-August
    • Bock, C.; UML 2 Activity and Action Models, Journal of Object Technology. Vol. 2 (4), July-August. (2003). pp.43-53.
    • (2003) Journal of Object Technology , vol.2 , Issue.4 , pp. 43-53
    • Bock, C.1
  • 8
    • 2942735594 scopus 로고    scopus 로고
    • UML 2 Activity and Action Models, Part2: Actions
    • September-October
    • Bock, C.; UML 2 Activity and Action Models, Part2: Actions, Journal of Object Technology. Vol. 2 (5), September-October. (2003). pp.41-56.
    • (2003) Journal of Object Technology , vol.2 , Issue.5 , pp. 41-56
    • Bock, C.1
  • 9
    • 33749599831 scopus 로고    scopus 로고
    • BPMN;, OMG Final Adopted Specification, dtc/06-02-01
    • BPMN; Business Process Modeling Notation Specification, OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf. (2006).
    • (2006) Business Process Modeling Notation Specification
  • 12
    • 2942757657 scopus 로고    scopus 로고
    • Engineering Security Requirements
    • January-February
    • Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.1
  • 13
    • 2942753973 scopus 로고    scopus 로고
    • Specifying Reusable Security Requirements
    • January-February
    • Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 15
    • 0035300743 scopus 로고    scopus 로고
    • A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques
    • Giaglis, G. M.; A Taxonomy of Business Process Modelling and Information Systems Modelling Techniques, International Journal of Flexible Manufacturing Systems. Vol. 13 (2). (2001). pp.209-228.
    • (2001) International Journal of Flexible Manufacturing Systems , vol.13 , Issue.2 , pp. 209-228
    • Giaglis, G.M.1
  • 19
    • 84944220091 scopus 로고    scopus 로고
    • Jürjens, J.; Towards Development of Secure Systems Using UMLsec, Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001. 2029. Genova, Italy. (2001). pp. 187-200.
    • Jürjens, J.; Towards Development of Secure Systems Using UMLsec, Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 at ETAPS-2001. Vol. 2029. Genova, Italy. (2001). pp. 187-200.
  • 26
    • 17744394269 scopus 로고    scopus 로고
    • Specification and design of advanced authentication and authorization services
    • Lopez, J., Montenegro, J. A., Vivas, J. L., Okamoto, E. and Dawson, E.; Specification and design of advanced authentication and authorization services, Computer Standards & Interfaces. Vol. 27 (5). (2005). pp.467-478.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.5 , pp. 467-478
    • Lopez, J.1    Montenegro, J.A.2    Vivas, J.L.3    Okamoto, E.4    Dawson, E.5
  • 31
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • Mouratidis, H., Giorgini, P. and Manson, G. A.; When security meets software engineering: a case of modelling secure information systems. Information Systems. Vol. 30 (8). (2005). pp.609-629.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.A.3
  • 32
    • 1542700278 scopus 로고    scopus 로고
    • Object Management Group; MDA Guide Version 1.0.1. In http://www.omg.org/docs/omg/03-06-01.pdf. (2003).
    • (2003) MDA Guide Version 1.0.1
  • 33
    • 38949150740 scopus 로고    scopus 로고
    • Object Management Group; Unified Modeling Language: Super-structure, version 2.0, formal/05-07-04. In, 2005
    • Object Management Group; Unified Modeling Language: Super-structure, version 2.0, formal/05-07-04. In http://www.omg.org/-docs/ formal/05-07-04.pdf. (2005).
  • 38
    • 33749055181 scopus 로고    scopus 로고
    • Roser, S. and Bauer, B.; A Categorization of Collaborative Business Process Modeling Techniques, 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005). Munchen, Germany. (2005). pp.43-54.
    • Roser, S. and Bauer, B.; A Categorization of Collaborative Business Process Modeling Techniques, 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005). Munchen, Germany. (2005). pp.43-54.
  • 39
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • Siponen, M. T.; Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods. Information and Organization. Vol. 15. (2005). pp.339-375.
    • (2005) Information and Organization , vol.15 , pp. 339-375
    • Siponen, M.T.1
  • 42
    • 35248832632 scopus 로고    scopus 로고
    • Towards a Business Process-Driven Framework for security Engineering with the UML
    • ISC. Bristol, U.K
    • Vivas, J. L., Montenegro, J. A. and Lopez, J.; Towards a Business Process-Driven Framework for security Engineering with the UML, Information Security: 6th International Conference, ISC. Bristol, U.K. (2003). pp.381-395.
    • (2003) Information Security: 6th International Conference , pp. 381-395
    • Vivas, J.L.1    Montenegro, J.A.2    Lopez, J.3
  • 43
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • Zuccato, A.; Holistic security requirement engineering for electronic commerce, Computers & Security. Vol. 23 (1). (2004). pp.63-76.
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 63-76
    • Zuccato, A.1
  • 44
    • 33845206869 scopus 로고    scopus 로고
    • Zulkernine, M. and Ahamed, S. I., Software Security Engineering: Toward Unifying Software Engineering and Security Engineering, in: Idea Group (Ed.), Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, M. Warkentin & R. Vaughn, 2006, p.215-232.
    • Zulkernine, M. and Ahamed, S. I., Software Security Engineering: Toward Unifying Software Engineering and Security Engineering, in: Idea Group (Ed.), Enterprise Information Systems Assurance and Systems Security: Managerial and Technical Issues, M. Warkentin & R. Vaughn, 2006, p.215-232.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.