-
2
-
-
84859973861
-
Modelling security goals in business processes
-
Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. Modellierung 127, 201-216 (2008)
-
(2008)
Modellierung
, vol.127
, pp. 201-216
-
-
Wolter, C.1
Menzel, M.2
Meinel, C.3
-
3
-
-
34247151648
-
A bpmn extension for the modeling of security requirements in business processes
-
Rodr?guez, A., Fernandez-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE Transactions on Information and Systems 90(4), 745-752 (2007)
-
(2007)
IEICE Transactions on Information and Systems
, vol.90
, Issue.4
, pp. 745-752
-
-
Rodrguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
5
-
-
33644553339
-
Security in business process engineering
-
In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) Springer, Heidelberg
-
Backes, M., Pfitzmann, B., Waidner, M.: Security in Business Process Engineering. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168-183. Springer, Heidelberg (2003)
-
(2003)
BPM 2003. LNCS
, vol.2678
, pp. 168-183
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
6
-
-
70349683196
-
Security requirements specification in serviceoriented business process management
-
IEEE
-
Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in serviceoriented business process management. In: 2009 International Conference on Availability, Reliability and Security, pp. 41-48. IEEE (2009)
-
(2009)
2009 International Conference on Availability, Reliability and Security
, pp. 41-48
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
7
-
-
84864559002
-
Non-functional requirements in business process modeling
-
Australian Computer Society, Inc.
-
Pavlovski, C., Zou, J.: Non-functional requirements in business process modeling. In: Proceedings of the Fifth Asia-Pacific Conference on Conceptual Modelling, vol. 79, pp. 103-112. Australian Computer Society, Inc. (2008)
-
(2008)
Proceedings of the Fifth Asia-Pacific Conference on Conceptual Modelling
, vol.79
, pp. 103-112
-
-
Pavlovski, C.1
Zou, J.2
-
8
-
-
84879730685
-
A method for eliciting goals for business process models based on non-functional requirements catalogues
-
Cardoso, E., Almeida, J., Guizzardi, R., Guizzardi, G.: A method for eliciting goals for business process models based on non-functional requirements catalogues. International Journal of Information System Modeling and Design (IJISMD) 2(2), 1-18 (2011)
-
(2011)
International Journal of Information System Modeling and Design (IJISMD)
, vol.2
, Issue.2
, pp. 1-18
-
-
Cardoso, E.1
Almeida, J.2
Guizzardi, R.3
Guizzardi, G.4
-
9
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A.: Eliciting security requirements with misuse cases. Requirements Engineering 10(1), 34-44 (2005)
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.2
-
10
-
-
79955163100
-
UMLsec: Extending uml for secure systems development
-
In: Jezequel, J.-M., Hussmann, H., Cook, S. (eds.) Springer, Heidelberg
-
Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jezequel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 412-425
-
-
Jurjens, J.1
-
11
-
-
38149121542
-
Mal-activity diagrams for capturing attacks on business processes
-
In: Sawyer, P., Heymans, P. (eds.) Springer, Heidelberg
-
Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
-
(2007)
REFSQ 2007. LNCS
, vol.4542
, pp. 355-366
-
-
Sindre, G.1
-
12
-
-
38049132726
-
Designing and implementing cross-organizational business processes-description and application of a modelling framework
-
Greiner, U., Lippe, S., Kahl, T., Ziemann, J., Jakel, F.W.: Designing and implementing cross-organizational business processes-description and application of a modelling framework. Enterprise Interoperability, pp. 137-147 (2007)
-
(2007)
Enterprise Interoperability
, pp. 137-147
-
-
Greiner, U.1
Lippe, S.2
Kahl, T.3
Ziemann, J.4
Jakel, F.W.5
-
13
-
-
0032675444
-
An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts
-
Singh, M.P.: An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts. Artificial Intelligence and Law 7(1), 97-113 (1999)
-
(1999)
Artificial Intelligence and Law
, vol.7
, Issue.1
, pp. 97-113
-
-
Singh, M.P.1
-
15
-
-
84879697715
-
-
Initial analysis of the industrial case studies
-
Aniketos: Deliverable 6.1: Initial analysis of the industrial case studies (2011)
-
(2011)
Aniketos: Deliverable 6.1
-
-
-
17
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems 8(3), 203-236 (2004)
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
|