메뉴 건너뛰기




Volumn 106 LNBIP, Issue , 2012, Pages 77-89

Security requirements engineering for secure business processes

Author keywords

BPMN; business process; Security requirements; social commitments

Indexed keywords

AIR TRAFFIC CONTROL; REQUIREMENTS ENGINEERING;

EID: 84864647111     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-29231-6_7     Document Type: Conference Paper
Times cited : (16)

References (19)
  • 2
    • 84859973861 scopus 로고    scopus 로고
    • Modelling security goals in business processes
    • Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. Modellierung 127, 201-216 (2008)
    • (2008) Modellierung , vol.127 , pp. 201-216
    • Wolter, C.1    Menzel, M.2    Meinel, C.3
  • 5
    • 33644553339 scopus 로고    scopus 로고
    • Security in business process engineering
    • In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) Springer, Heidelberg
    • Backes, M., Pfitzmann, B., Waidner, M.: Security in Business Process Engineering. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168-183. Springer, Heidelberg (2003)
    • (2003) BPM 2003. LNCS , vol.2678 , pp. 168-183
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 9
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl, A.: Eliciting security requirements with misuse cases. Requirements Engineering 10(1), 34-44 (2005)
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 10
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending uml for secure systems development
    • In: Jezequel, J.-M., Hussmann, H., Cook, S. (eds.) Springer, Heidelberg
    • Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jezequel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
    • (2002) UML 2002. LNCS , vol.2460 , pp. 412-425
    • Jurjens, J.1
  • 11
    • 38149121542 scopus 로고    scopus 로고
    • Mal-activity diagrams for capturing attacks on business processes
    • In: Sawyer, P., Heymans, P. (eds.) Springer, Heidelberg
    • Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
    • (2007) REFSQ 2007. LNCS , vol.4542 , pp. 355-366
    • Sindre, G.1
  • 12
    • 38049132726 scopus 로고    scopus 로고
    • Designing and implementing cross-organizational business processes-description and application of a modelling framework
    • Greiner, U., Lippe, S., Kahl, T., Ziemann, J., Jakel, F.W.: Designing and implementing cross-organizational business processes-description and application of a modelling framework. Enterprise Interoperability, pp. 137-147 (2007)
    • (2007) Enterprise Interoperability , pp. 137-147
    • Greiner, U.1    Lippe, S.2    Kahl, T.3    Ziemann, J.4    Jakel, F.W.5
  • 13
    • 0032675444 scopus 로고    scopus 로고
    • An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts
    • Singh, M.P.: An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts. Artificial Intelligence and Law 7(1), 97-113 (1999)
    • (1999) Artificial Intelligence and Law , vol.7 , Issue.1 , pp. 97-113
    • Singh, M.P.1
  • 15
    • 84879697715 scopus 로고    scopus 로고
    • Initial analysis of the industrial case studies
    • Aniketos: Deliverable 6.1: Initial analysis of the industrial case studies (2011)
    • (2011) Aniketos: Deliverable 6.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.