-
1
-
-
84863584576
-
CoSMo: An approach towards conceptual security modeling
-
A. Hameurlain, R. Cicchetti, and R. Traunmüller, editors, Database and Expert Systems Applications (DEXA), Springer-Verlag
-
C. Artelsmair, W. Eßmayr, P. Lang, R. Wagner, and E. Weippl. CoSMo: An approach towards conceptual security modeling. In A. Hameurlain, R. Cicchetti, and R. Traunmüller, editors, Database and Expert Systems Applications (DEXA), volume 2453 of Lecture Notes in Computer Science, pages 557-566. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2453
, pp. 557-566
-
-
Artelsmair, C.1
Eßmayr, W.2
Lang, P.3
Wagner, R.4
Weippl, E.5
-
2
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. A. Basin, J. Doser, and T. Lodderstedt. Model driven security: From UML models to access control infrastructures. acm Transactions on Software Engineering and Methodology, 15(1):39-91, 2006.
-
(2006)
Acm Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.A.1
Doser, J.2
Lodderstedt, T.3
-
3
-
-
33750049302
-
Proviado - Personalized and configurable visualizations of business processes
-
R. Bobrik, T. Bauer, and M. Reichert. Proviado - personalized and configurable visualizations of business processes. In EC-Web, pages 61-71, 2006.
-
(2006)
EC-Web
, pp. 61-71
-
-
Bobrik, R.1
Bauer, T.2
Reichert, M.3
-
9
-
-
70849133209
-
Saving water: From field to fork: Curbing losses and wastage in the food chain
-
J. Lundqvist, C. de Fraiture, and D. Molden. Saving water: From field to fork: Curbing losses and wastage in the food chain. In SIWI Policy Brief, 2008.
-
(2008)
SIWI Policy Brief
-
-
Lundqvist, J.1
De Fraiture, C.2
Molden, D.3
-
11
-
-
78650125348
-
Workflow ART
-
R. Meersman, T. S. Dillon, and P. Herrero, editors, OTM Conferences (1), Springer-Verlag
-
G. Monakova and F. Leymann. Workflow ART. In R. Meersman, T. S. Dillon, and P. Herrero, editors, OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, pages 376-393. Springer-Verlag, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6426
, pp. 376-393
-
-
Monakova, G.1
Leymann, F.2
-
12
-
-
40549090779
-
Business process visualization - Use cases, challenges, solutions
-
S. Rinderle, R. Bobrik, M. Reichert, and T. Bauer. Business process visualization - use cases, challenges, solutions. In ICEIS (3), pages 204-211, 2006.
-
(2006)
ICEIS
, Issue.3
, pp. 204-211
-
-
Rinderle, S.1
Bobrik, R.2
Reichert, M.3
Bauer, T.4
-
13
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
DOI 10.1093/ietisy/e90-d.4.745
-
A. Rodríguez, E. Fernández-Medina, and M. Piattini. A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst., E90-D:745-752, 2007. (Pubitemid 46600133)
-
(2007)
IEICE Transactions on Information and Systems
, vol.E90-D
, Issue.4
, pp. 745-752
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
14
-
-
63949084590
-
Model-driven business process security requirement specification
-
Secure Service-Oriented Architectures
-
C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel. Model-driven business process security requirement specification. Journal of Systems Architecture, 55(4):211-223, 2009. Secure Service-Oriented Architectures.
-
(2009)
Journal of Systems Architecture
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
|