-
6
-
-
0030084693
-
Process mapping: One of three, new, special quality tools for management, quality and all other professionals
-
Anjard RP (1996) Process mapping: one of three, new, special quality tools for management, quality and all other professionals. Microelectron Reliab 36(2):223-225
-
(1996)
Microelectron Reliab
, vol.36
, Issue.2
, pp. 223-225
-
-
Anjard, R.P.1
-
7
-
-
84948980573
-
Uml activity diagrams as a workflow specification language
-
Dumas M, Arthur HM (2001) Uml activity diagrams as a workflow specification language. Lect Notes Comput Sci 2185:76-90
-
(2001)
Lect Notes Comput Sci
, vol.2185
, pp. 76-90
-
-
Dumas, M.1
Arthur, H.M.2
-
12
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Clark DD, Wilson DR (1987) A comparison of commercial and military computer security policies. Secur Priv 00:184
-
(1987)
Secur Priv
, vol.0
, pp. 184
-
-
Clark, D.D.1
Wilson, D.R.2
-
13
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed nist standard for role-based access control. ACM Trans Inf Syst Secur 4(3):224-274
-
(2001)
ACM Trans Inf Syst Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
14
-
-
0038825675
-
Task-role-based access control model
-
Sejong OH, Park S (2003) Task-role-based access control model. Inf Syst 28(6):533-562
-
(2003)
Inf Syst
, vol.28
, Issue.6
, pp. 533-562
-
-
Sejong, O.H.1
Park, S.2
-
15
-
-
34547962799
-
Operational risk management in financial institutions: Process assessment in concordance with basel ii
-
Di Renzo B, Hillairet M, Picard M, Rifaut A, Bernard C, Hagen D, Maar P, Reinard D (2007) Operational risk management in financial institutions: process assessment in concordance with basel ii. Softw Process 12(4):321-330
-
(2007)
Softw Process
, vol.12
, Issue.4
, pp. 321-330
-
-
Di Renzo, B.1
Hillairet, M.2
Picard, M.3
Rifaut, A.4
Bernard, C.5
Hagen, D.6
Maar, P.7
Reinard, D.8
-
16
-
-
70350687578
-
Modeling in confidentiality and integrity for a supply chain network
-
Chen KL, Shing M-L, Lee H, Shing C-C (2007) Modeling in confidentiality and integrity for a supply chain network. Commun IIMA 7(1):41-48
-
(2007)
Commun IIMA
, vol.7
, Issue.1
, pp. 41-48
-
-
Chen, K.L.1
Shing, M.-L.2
Lee, H.3
Shing, C.-C.4
-
19
-
-
34548118380
-
Integration of multilevel security features into loosely coupled inter-organizational workflows
-
IEEE Computer Society, Washington, DC
-
Gami N, Mikolajczak B (2007) Integration of multilevel security features into loosely coupled inter-organizational workflows. In: ITNG '07: proceedings of the international conference on information technology. IEEE Computer Society, Washington, DC, pp 653-657
-
(2007)
ITNG '07: Proceedings of the International Conference On Information Technology
, pp. 653-657
-
-
Gami, N.1
Mikolajczak, B.2
-
22
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha RA, Eloff JHP (2001) Separation of duties for access control enforcement in workflow environments. IBM Syst J 40(3):666-682
-
(2001)
IBM Syst J
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
27
-
-
40249115100
-
Verification of strict integrity policy via petri nets
-
IEEE Computer Society, Washington, DC
-
Zhang Z-L, Hong F, Xiao H-J (2006) Verification of strict integrity policy via petri nets. In: ICSNC '06: proceedings of the international conference on systems and networks communication. IEEE Computer Society, Washington, DC, pp 23
-
(2006)
ICSNC '06: Proceedings of the International Conference On Systems and Networks Communication
, pp. 23
-
-
Zhang, Z.-L.1
Hong, F.2
Xiao, H.-J.3
-
29
-
-
0003697514
-
-
Center for the Study of Language and Information, Stanford
-
Goldblatt Robert (1987) Logics of time and computation. Center for the Study of Language and Information, Stanford
-
(1987)
Logics of Time and Computation
-
-
Robert, G.1
-
30
-
-
4744347868
-
Best-practice patterns and tool support for configuring secure web services messaging
-
IEEE Computer Society,Washington, DC
-
Tatsubori M, Imamura T, Nakamura Y, (2004) Best-practice patterns and tool support for configuring secure web services messaging. In: ICWS'04: proceedings of the IEEE international conference onweb services. IEEE Computer Society,Washington, DC, p 244
-
(2004)
ICWS'04: Proceedings of the IEEE International Conference Onweb Services
, pp. 244
-
-
Tatsubori, M.1
Imamura, T.2
Nakamura, Y.3
-
32
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
Mylopoulos J, Chung L, Nixon B (1992) Representing and using nonfunctional requirements: a process-oriented approach. IEEE Trans Softw Eng 18(6):483-497
-
(1992)
IEEE Trans Softw Eng
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
34
-
-
40549104648
-
An ontology framework for semantic business process management
-
Hepp M, Roman D (2007) An ontology framework for semantic business process management. In: Wirtschaftsinformatik (1). Pp 423-440
-
(2007)
Wirtschaftsinformatik
, Issue.1
, pp. 423-440
-
-
Hepp, M.1
Roman, D.2
-
35
-
-
29744447253
-
Business-driven application security: From modeling to managing secure applications
-
Nagaratnam N, Nadalin AJ, Hondo M, McIntosh M, Austel P (2005) Business-driven application security: from modeling to managing secure applications. IBM Syst J 44(4):847-868
-
(2005)
IBM Syst J
, vol.44
, Issue.4
, pp. 847-868
-
-
Nagaratnam, N.1
Nadalin, A.J.2
Hondo, M.3
McIntosh, M.4
Austel, P.5
-
36
-
-
34247151648
-
A bpmn extension for the modeling of security requirements in business processes
-
Rodrguez A, Fernández-Medina E, Piattini M (2007) A bpmn extension for the modeling of security requirements in business processes. IEICE Trans 90-D(4):745-752
-
(2007)
IEICE Trans 90-D(4)
, pp. 745-752
-
-
Rodrguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
38
-
-
48949106311
-
-
Technical Report RZ 3616, IBM Research, Zurich
-
Giblin C, Liu AY, Müller S, Pfitzmann B, Zhou X (2005) Regulations expressed as logical models (realm). Technical Report RZ 3616, IBM Research, Zurich, 07
-
(2005)
Regulations Expressed As Logical Models (realm)
, pp. 07
-
-
Giblin, C.1
Liu, A.Y.2
Müller, S.3
Pfitzmann, B.4
Zhou, X.5
-
39
-
-
85029776668
-
An automated tool for analyzing petri nets using SPIN
-
Gannod GC, Gupta S (2001) An automated tool for analyzing petri nets using SPIN. ASE 0:404
-
(2001)
ASE
, vol.0
, pp. 404
-
-
Gannod, G.C.1
Gupta, S.2
-
40
-
-
34250718156
-
Formal semantics and analysis of control flow in ws-bpel
-
Ouyang C, Verbeek E, van der Aalst WMP, Breutel S, Dumas M, ter Hofstede AHM (2007) Formal semantics and analysis of control flow in ws-bpel. Sci Comput Program 67(2-3):162-198
-
(2007)
Sci Comput Program
, vol.67
, Issue.2-3
, pp. 162-198
-
-
Ouyang, C.1
Verbeek, E.2
van der Aalst, W.M.P.3
Breutel, S.4
Dumas, M.5
ter Hofstede, A.H.M.6
|