-
3
-
-
0141684326
-
-
version 2.0, formal/05-07-04
-
Object Management Group; Unified Modeling Language: Superstructure, version 2.0, formal/05-07-04. In http://www.omg.org/docs/formal/05-07-04.pdf. (2005).
-
(2005)
Unified Modeling Language: Superstructure
-
-
-
4
-
-
33749599831
-
-
OMG Final Adopted Specification, dtc/06-02-01
-
BPMN; Business Process Modeling Notation Specification, OMG Final Adopted Specification, dtc/06-02-01. In http://www.bpmn.org/Documents/ OMG%20Final%20Adopted%20BP MN%201-0%20Spec%2006-02-01.pdf. (2006).
-
(2006)
Business Process Modeling Notation Specification
-
-
-
5
-
-
1542700278
-
-
Object Management Group; MDA Guide Version 1.0.1. In http://www.omg.org/ docs/omg/03-06-01.pdf. (2003).
-
(2003)
MDA Guide Version 1.0.1
-
-
-
6
-
-
33644553339
-
Security in business process engineering
-
LNCS. Eindhoven, Netherlands
-
Backes, M., Pfitzmann, B. and Waider, M.; Security in Business Process Engineering, International Conference on Business Process Management (BPM). Vol. 2678, LNCS. Eindhoven, Netherlands. (2003). pp.168-183.
-
(2003)
International Conference on Business Process Management (BPM)
, vol.2678
, pp. 168-183
-
-
Backes, M.1
Pfitzmann, B.2
Waider, M.3
-
8
-
-
2942757657
-
Engineering security requirements
-
January-February
-
Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2 (1), January-February. (2003). pp.53-68.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
9
-
-
2942753973
-
Specifying reusable security requirements
-
January-February
-
Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology. Vol. 3 (1), January-February. (2004). pp.61-75.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
10
-
-
78649250434
-
Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio
-
Sitges, España
-
Rodríguez, A., Fernández-Medina, E. and Piattini, M.; Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio, XI Jornadas de Ingeniería del Software y Bases de Datos. Sitges, España. (2006). pp.347-356.
-
(2006)
XI Jornadas de Ingeniería del Software y Bases de Datos
, pp. 347-356
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
11
-
-
78649278005
-
Rational unified process, best practices for software development teams
-
Rational Software 463
-
Rational Software, Rational Unified Process, Best Practices for Software Development Teams, (2001). p.21, Jacobson, I., Booch, G. and Rumbaugh, J., The Unified Software Development Process, (1999). 463 p.
-
(1999)
The Unified Software Development Process
, pp. 21
-
-
Jacobson, I.1
Booch, G.2
Rumbaugh, J.3
-
12
-
-
33749367621
-
Security requirement analysis of business processes
-
Herrmann, P. and Herrmann, G.; Security requirement analysis of business processes, Electronic Commerce Research. Vol. 6 (3-4). (2006). pp.305-335,
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.3-4
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
13
-
-
84942786976
-
A language for modelling secure business transactions
-
Phoenix, Arizona
-
Röhm, A. W., Herrmann, G. and Pernul, G.; A Language for Modelling Secure Business Transactions, 15th. Annual Computer Security Applications Conference. Phoenix, Arizona. (1999). pp.22-31.
-
(1999)
15th. Annual Computer Security Applications Conference
, pp. 22-31
-
-
Röhm, A.W.1
Herrmann, G.2
Pernul, G.3
-
14
-
-
33750048791
-
A business process-driven approach to security engineering
-
Prague, Czech Republic
-
Maña, A., Montenegro, J. A., Rudolph, C. and Vivas, J. L.; A business process-driven approach to security engineering, 14th. International Workshop on Database and Expert Systems Applications (DEXA). Prague, Czech Republic. (2003). pp.477-481,
-
(2003)
14th. International Workshop on Database and Expert Systems Applications (DEXA)
, pp. 477-481
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
15
-
-
35248832632
-
Towards a business process-driven framework for security engineering with the UML
-
Bristol, U.K.
-
Vivas, J. L., Montenegro, J. A. and Lopez, J.; Towards a Business Process-Driven Framework for security Engineering with the UML, Information Security: 6th International Conference, ISC. Bristol, U.K. (2003). pp.381-395.
-
(2003)
Information Security: 6th International Conference, ISC
, pp. 381-395
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
-
17
-
-
33845222373
-
Extending the UML 2 activity diagram with business process goals and performance measures and the mapping to BPEL
-
Tucson, Arizona, USA
-
Korherr, B. and List, B.; Extending the UML 2 Activity Diagram with Business Process Goals and Performance Measures and the Mapping to BPEL, 2nd International Workshop on Best Practices of UML (BP-UML) at ER Conference. Tucson, Arizona, USA. (2006). pp.7-18.
-
(2006)
2nd International Workshop on Best Practices of UML (BP-UML) at ER Conference
, pp. 7-18
-
-
Korherr, B.1
List, B.2
-
18
-
-
33750062930
-
Extending UML 2 activity diagrams with business intelligence objects
-
Copenhagen, Denmark
-
Stefanov, V., List, B. and Korherr, B.; Extending UML 2 Activity Diagrams with Business Intelligence Objects, 7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005). Copenhagen, Denmark. (2005).
-
(2005)
7th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2005)
-
-
Stefanov, V.1
List, B.2
Korherr, B.3
-
19
-
-
33750037373
-
UML business modeling profile
-
Vilnius, Lithuania
-
Kalnins, A., Barzdins, J. and Celms, E.; UML Business Modeling Profile, Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education. Vilnius, Lithuania. (2004). pp.182-194.
-
(2004)
Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education
, pp. 182-194
-
-
Kalnins, A.1
Barzdins, J.2
Celms, E.3
-
21
-
-
33747166768
-
The OMG's model driven architecture and BPM
-
Harmon, P.; The OMG's Model Driven Architecture and BPM. Business Process Trends, Vol. 2 (5). In http://www.bptrends.com/publicationfiles/ 05%2D04%20NL%20MDA %20and%20BPM%2Epdf. (2004).
-
(2004)
Business Process Trends
, vol.2
, Issue.5
-
-
Harmon, P.1
-
22
-
-
78649265782
-
Business object-oriented modeling for business analysts
-
B.O.O.M.
-
Podeswa, H., B.O.O.M.: Business Object-Oriented Modeling for Business Analysts, Thomson Course Technology Incorporated, (2005). 401 p.
-
(2005)
Thomson Course Technology Incorporated
, pp. 401
-
-
Podeswa, H.1
-
25
-
-
5744229775
-
Deriving security requirements from crosscutting threat descriptions
-
Lancaster, UK
-
Haley, C. B., Laney, R. C. and Nuseibeh, B.; Deriving security requirements from crosscutting threat descriptions, 3rd International Conference on Aspect-Oriented Software Development (AOSD). Lancaster, UK. (2004). pp.112-121.
-
(2004)
3rd International Conference on Aspect-Oriented Software Development (AOSD)
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.C.2
Nuseibeh, B.3
-
26
-
-
17544394392
-
Computer security in the real world
-
Lampson, B. W.; Computer Security in the Real World, IEEE Computer. Vol. 37 (6). (2004). pp.37-46.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
|