메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1667-1673

Security and safety of assets in business processes

Author keywords

BPMN; monitoring; resource modeling; safety; security

Indexed keywords

BPMN; BUSINESS PROCESS; BUSINESS PROCESS MODEL; EXECUTION SEMANTICS; RESOURCE MODELING; SAFETY CONSTRAINT; SAFETY CONTROLS; SAFETY REQUIREMENTS; SECURITY;

EID: 84863586009     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2245276.2232045     Document Type: Conference Paper
Times cited : (14)

References (14)
  • 1
    • 84863584576 scopus 로고    scopus 로고
    • CoSMo: An approach towards conceptual security modeling
    • A. Hameurlain, R. Cicchetti, and R. Traunmüller, editors, Database and Expert Systems Applications (DEXA), Springer-Verlag
    • C. Artelsmair, W. Eßmayr, P. Lang, R. Wagner, and E. Weippl. CoSMo: An approach towards conceptual security modeling. In A. Hameurlain, R. Cicchetti, and R. Traunmüller, editors, Database and Expert Systems Applications (DEXA), volume 2453 of Lecture Notes in Computer Science, pages 557-566. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2453 , pp. 557-566
    • Artelsmair, C.1    Eßmayr, W.2    Lang, P.3    Wagner, R.4    Weippl, E.5
  • 3
    • 33750049302 scopus 로고    scopus 로고
    • Proviado - Personalized and configurable visualizations of business processes
    • R. Bobrik, T. Bauer, and M. Reichert. Proviado - personalized and configurable visualizations of business processes. In EC-Web, pages 61-71, 2006.
    • (2006) EC-Web , pp. 61-71
    • Bobrik, R.1    Bauer, T.2    Reichert, M.3
  • 9
    • 70849133209 scopus 로고    scopus 로고
    • Saving water: From field to fork: Curbing losses and wastage in the food chain
    • J. Lundqvist, C. de Fraiture, and D. Molden. Saving water: From field to fork: Curbing losses and wastage in the food chain. In SIWI Policy Brief, 2008.
    • (2008) SIWI Policy Brief
    • Lundqvist, J.1    De Fraiture, C.2    Molden, D.3
  • 11
    • 78650125348 scopus 로고    scopus 로고
    • Workflow ART
    • R. Meersman, T. S. Dillon, and P. Herrero, editors, OTM Conferences (1), Springer-Verlag
    • G. Monakova and F. Leymann. Workflow ART. In R. Meersman, T. S. Dillon, and P. Herrero, editors, OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, pages 376-393. Springer-Verlag, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6426 , pp. 376-393
    • Monakova, G.1    Leymann, F.2
  • 12
    • 40549090779 scopus 로고    scopus 로고
    • Business process visualization - Use cases, challenges, solutions
    • S. Rinderle, R. Bobrik, M. Reichert, and T. Bauer. Business process visualization - use cases, challenges, solutions. In ICEIS (3), pages 204-211, 2006.
    • (2006) ICEIS , Issue.3 , pp. 204-211
    • Rinderle, S.1    Bobrik, R.2    Reichert, M.3    Bauer, T.4
  • 13
    • 34247151648 scopus 로고    scopus 로고
    • A BPMN extension for the modeling of security requirements in business processes
    • DOI 10.1093/ietisy/e90-d.4.745
    • A. Rodríguez, E. Fernández-Medina, and M. Piattini. A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst., E90-D:745-752, 2007. (Pubitemid 46600133)
    • (2007) IEICE Transactions on Information and Systems , vol.E90-D , Issue.4 , pp. 745-752
    • Rodriguez, A.1    Fernandez-Medina, E.2    Piattini, M.3
  • 14
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • Secure Service-Oriented Architectures
    • C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel. Model-driven business process security requirement specification. Journal of Systems Architecture, 55(4):211-223, 2009. Secure Service-Oriented Architectures.
    • (2009) Journal of Systems Architecture , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1    Menzel, M.2    Schaad, A.3    Miseldine, P.4    Meinel, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.