메뉴 건너뛰기




Volumn 6, Issue 4, 2008, Pages 339-346

JISBD2007-05: Secure business processes defined through a UML 2.0 extension

Author keywords

Activity Diagram; Business Process; Object Constraint Language (OCL); Security Requirement; Unified Modeling Language (UML)

Indexed keywords

ACTIVITY DIAGRAM; BUSINESS PROCESS; OBJECT CONSTRAINT LANGUAGE; SECURITY REQUIREMENTS; UNIFIED MODELING;

EID: 78649301359     PISSN: 15480992     EISSN: None     Source Type: Journal    
DOI: 10.1109/TLA.2008.4815287     Document Type: Conference Paper
Times cited : (3)

References (27)
  • 3
    • 0141684326 scopus 로고    scopus 로고
    • version 2.0, formal/05-07-04
    • Object Management Group; Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04. In http://www.omg.org/docs/formal/05-07-04.pdf. (2005).
    • (2005) Unified Modeling Language: Superstructure
  • 4
    • 33749599831 scopus 로고    scopus 로고
    • OMG Final Adopted Specification, dtc/06-02-01
    • BPMN; Business Process Modeling Notation Specification, OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BP MN%201-0%20Spec%2006-02-01.pdf. (2006).
    • (2006) Business Process Modeling Notation Specification
  • 5
    • 1542700278 scopus 로고    scopus 로고
    • Object Management Group; MDA Guide Version 1.0.1. In http://www.omg.org/ docs/omg/03-06-01.pdf. (2003).
    • (2003) MDA Guide Version 1.0.1
  • 8
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • January-February
    • Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.1
  • 9
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • January-February
    • Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 10
  • 11
    • 78649278005 scopus 로고    scopus 로고
    • Rational unified process, best practices for software development teams
    • Rational Software 463
    • Rational Software, Rational Unified Process, Best Practices for Software Development Teams, (2001). p.21, Jacobson, I., Booch, G. and Rumbaugh, J., The Unified Software Development Process, (1999). 463 p.
    • (1999) The Unified Software Development Process , pp. 21
    • Jacobson, I.1    Booch, G.2    Rumbaugh, J.3
  • 12
    • 33749367621 scopus 로고    scopus 로고
    • Security requirement analysis of business processes
    • Herrmann, P. and Herrmann, G.; Security requirement analysis of business processes, Electronic Commerce Research. Vol. 6 (3-4). (2006). pp.305-335,
    • (2006) Electronic Commerce Research , vol.6 , Issue.3-4 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2
  • 17
    • 33845222373 scopus 로고    scopus 로고
    • Extending the UML 2 activity diagram with business process goals and performance measures and the mapping to BPEL
    • Tucson, Arizona, USA
    • Korherr, B. and List, B.; Extending the UML 2 Activity Diagram with Business Process Goals and Performance Measures and the Mapping to BPEL, 2nd International Workshop on Best Practices of UML (BP-UML) at ER Conference. Tucson, Arizona, USA. (2006). pp.7-18.
    • (2006) 2nd International Workshop on Best Practices of UML (BP-UML) at ER Conference , pp. 7-18
    • Korherr, B.1    List, B.2
  • 21
    • 33747166768 scopus 로고    scopus 로고
    • The OMG's model driven architecture and BPM
    • Harmon, P.; The OMG's Model Driven Architecture and BPM. Business Process Trends, Vol. 2 (5). In http://www.bptrends.com/publicationfiles/ 05%2D04%20NL%20MDA %20and%20BPM%2Epdf. (2004).
    • (2004) Business Process Trends , vol.2 , Issue.5
    • Harmon, P.1
  • 22
    • 78649265782 scopus 로고    scopus 로고
    • Business object-oriented modeling for business analysts
    • B.O.O.M.
    • Podeswa, H., B.O.O.M.: Business Object-Oriented Modeling for Business Analysts, Thomson Course Technology Incorporated, (2005). 401 p.
    • (2005) Thomson Course Technology Incorporated , pp. 401
    • Podeswa, H.1
  • 26
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • Lampson, B. W.; Computer Security in the Real World, IEEE Computer. Vol. 37 (6). (2004). pp.37-46.
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B.W.1
  • 27


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.