-
2
-
-
0346608553
-
Security for Workflow Systems
-
DOI 10.1016/S1363-4127(01)00207-2
-
V. Atluri Security for workflow systems Information Security Technical Report 6 2 2001 59 68 (Pubitemid 33663939)
-
(2001)
Information Security Technical Report
, vol.6
, Issue.2
, pp. 59-68
-
-
Atluri, V.1
-
4
-
-
0030509189
-
A critical perspective on action research as a method for information systems research
-
R. Baskerville, and T. Wood-Harper A critical perspective on action research as a method for information systems research Journal of Information Technology 11 1996 235 246
-
(1996)
Journal of Information Technology
, vol.11
, pp. 235-246
-
-
Baskerville, R.1
Wood-Harper, T.2
-
6
-
-
19644394108
-
On the unification power of models
-
DOI 10.1007/s10270-005-0079-0
-
J. Bézivin On the unification power of models Software and Systems Modeling 4 2 2005 171 188 (Pubitemid 40736678)
-
(2005)
Software and Systems Modeling
, vol.4
, Issue.2
, pp. 171-188
-
-
Bezivin, J.1
-
7
-
-
34547665099
-
Progress in Web-based decision support technologies
-
DOI 10.1016/j.dss.2005.07.002, PII S0167923605001016
-
H.K. Bhargava, D.J. Power, and D. Sun Progress in web-based decision support technologies Decision Support Systems 43 2007 1083 1095 (Pubitemid 47223452)
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1083-1095
-
-
Bhargava, H.K.1
Power, D.J.2
Sun, D.3
-
9
-
-
0347270404
-
Principles of canonical action research
-
DOI 10.1111/j.1365-2575.2004.00162.x
-
R.M. Davison, M.G. Martinsons, and N. Kock Principles of canonical action research Information Systems Journal 14 2004 65 86 (Pubitemid 38087028)
-
(2004)
Information Systems Journal
, vol.14
, Issue.1
, pp. 65-86
-
-
Davison, R.M.1
Martinsons, M.G.2
Kock, N.3
-
11
-
-
84905824485
-
A comparative evaluation of three approaches to specifying security requirements
-
M.H. Diallo, J. Romero-Mariona, S.E. Sim, T.A. Alspaugh, and D.J. Richardson A comparative evaluation of three approaches to specifying security requirements 12th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ), Luxembourg 2006
-
(2006)
12th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ), Luxembourg
-
-
Diallo, M.H.1
Romero-Mariona, J.2
Sim, S.E.3
Alspaugh, T.A.4
Richardson, D.J.5
-
12
-
-
0034547883
-
Information systems architecture to support managed care business processes
-
A. Dutta, and S. Heda Information systems architecture to support managed care business processes Decision Support Systems 30 2000 217 225
-
(2000)
Decision Support Systems
, vol.30
, pp. 217-225
-
-
Dutta, A.1
Heda, S.2
-
14
-
-
2942757657
-
Engineering security requirements
-
D. Firesmith Engineering security requirements Journal of Object Technology 2 1 January-February 2003 53 68
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
15
-
-
2942753973
-
Specifying reusable security requirements
-
D. Firesmith Specifying reusable security requirements Journal of Object Technology 3 1 January-February 2004 61 75
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
17
-
-
2342590692
-
Unifying business objects and system dynamics as a paradigm for developing decision support systems
-
A. Gregoriades, and B. Karakostasb Unifying business objects and system dynamics as a paradigm for developing decision support systems Decision Support Systems 37 2004 307 311
-
(2004)
Decision Support Systems
, vol.37
, pp. 307-311
-
-
Gregoriades, A.1
Karakostasb, B.2
-
19
-
-
33747166768
-
The OMG's model driven architecture and BPM
-
P. Harmon The OMG's model driven architecture and BPM Business Process Trends 2 5 2004
-
(2004)
Business Process Trends
, vol.2
, Issue.5
-
-
Harmon, P.1
-
22
-
-
33749367621
-
Security requirement analysis of business processes
-
DOI 10.1007/s10660-006-8677-7
-
P. Herrmann, and G. Herrmann Security requirement analysis of business processes Electronic Commerce Research 6 3-4 2006 305 335 (Pubitemid 44488792)
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.3-4
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
23
-
-
77950516884
-
Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and Umlsec
-
S. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and Umlsec Requirements Engineering (Special Issue - Security Requirements Engineering) 2010(15) 2010 63
-
(2010)
Requirements Engineering (Special Issue - Security Requirements Engineering)
, vol.2010
, Issue.15
, pp. 63
-
-
Houmb, S.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
24
-
-
72149133384
-
A business process gap detecting mechanism between information system process flow and internal control flow
-
S.-M. Huang, D.C. Yen, Y.-C. Hung, Y.-J. Zhou, J.-S. Hua, A business process gap detecting mechanism between information system process flow and internal control flow. Decision Support Systems 47 (2009) 436-454.
-
(2009)
Decision Support Systems
, vol.47
, pp. 436-454
-
-
Huang, S.-M.1
Yen, D.C.2
Hung, Y.-C.3
Zhou, Y.-J.4
Hua, J.-S.5
-
29
-
-
33750037373
-
UML business modeling profile
-
A. Kalnins, J. Barzdins, and E. Celms UML business modeling profile Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education, Vilnius, Lithuania 2004
-
(2004)
Thirteenth International Conference on Information Systems Development, Advances in Theory, Practice and Education, Vilnius, Lithuania
-
-
Kalnins, A.1
Barzdins, J.2
Celms, E.3
-
32
-
-
17544394392
-
Computer security in the real world
-
B.W. Lampson Computer security in the real world IEEE Computer 37 6 2004 37 46
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
35
-
-
0242655790
-
SecureUML: A UML-based modeling language for model-driven security
-
T. Lodderstedt, D. Basin, and J. Doser SecureUML: a UML-based modeling language for model-driven security UML, 5th International Conference, Dresden, Germany 2002
-
(2002)
UML, 5th International Conference, Dresden, Germany
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
36
-
-
58149134804
-
Business Process Modeling and Standardization
-
A. Lonjon Business Process Modeling and Standardization BPTrends 2004 http://www.bptrends.com/
-
(2004)
BPTrends
-
-
Lonjon, A.1
-
37
-
-
33750048791
-
A business process-driven approach to security engineering
-
A. Maña, J.A. Montenegro, C. Rudolph, and J.L. Vivas A business process-driven approach to security engineering 14th International Workshop on Database and Expert Systems Applications (DEXA), Prague, Czech Republic 2003
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA), Prague, Czech Republic
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
39
-
-
77950516969
-
A systematic review of security requirements engineering
-
D. Mellado, C. Blanco, L.E. Sánchez, and E. Fernández- Medina A systematic review of security requirements engineering Computer Standards & Interfaces 32 4 2010 153 165
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.4
, pp. 153-165
-
-
Mellado, D.1
Blanco, C.2
Sánchez, L.E.3
Fernández-Medina, E.4
-
41
-
-
0030126157
-
An integrated approach for the specification of processes and related complex structured objects in business applications
-
DOI 10.1016/0167-9236(95)00021-6
-
A. Oberweis An integrated approach for the specification of processes and related complex structured objects in business applications Decision Support Systems 17 1996 31 53 (Pubitemid 126374788)
-
(1996)
Decision Support Systems
, vol.17
, Issue.SPEC. ISS. 1
, pp. 31-53
-
-
Oberweis, A.1
-
42
-
-
1542700278
-
-
Object Management Group
-
Object Management Group MDA Guide Version 1.0.1 2003
-
(2003)
MDA Guide Version 1.0.1
-
-
-
46
-
-
79955905722
-
-
QVT, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, ed. OMG Adopted Specification ptc/05-11-01. 2005. 204
-
QVT, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, ed. OMG Adopted Specification ptc/05-11-01. 2005. 204.
-
-
-
-
47
-
-
37249076412
-
Analysis-level classes from secure business processes through models transformations
-
A. Rodríguez, E. Fernández-Medina, and M. Piattini Analysis-level classes from secure business processes through models transformations 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), Regensburg, Germany 2007
-
(2007)
4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), Regensburg, Germany
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
52
-
-
77953671395
-
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach
-
A. Rodriguez, I. García-Rodríguez de Guzmán, E. Fernández-Medina, and M. Piattini Semi-formal transformation of secure business processes into analysis class and use case models: an MDA approach Information & Software Technology 52 9 2010 945 971
-
(2010)
Information & Software Technology
, vol.52
, Issue.9
, pp. 945-971
-
-
Rodriguez, A.1
García-Rodríguez De Guzmán, I.2
Fernández-Medina, E.3
Piattini, M.4
-
58
-
-
14244261953
-
Towards a business process-driven framework for security engineering with the UML
-
J.L. Vivas, J.A. Montenegro, and J. Lopez Towards a business process-driven framework for security engineering with the UML Boyd Colin, Mao Wenbo, Information Security: 6th International Conference, ISC, Bristol, U.K. 2003
-
(2003)
Information Security: 6th International Conference, ISC, Bristol, U.K.
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
-
59
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
A. Zuccato Holistic security requirement engineering for electronic commerce Computers & Security 23 1 2004 63 76
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63-76
-
-
Zuccato, A.1
|