메뉴 건너뛰기




Volumn 112 LNBIP, Issue , 2012, Pages 1-15

Towards definition of secure business processes

Author keywords

Alignment of modelling languages; Business process model and notation (BPMN); Information systems; Security risk management

Indexed keywords

INFORMATION SYSTEMS; MATHEMATICAL MODELS; TECHNICAL PRESENTATIONS;

EID: 84864711339     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-31069-0_1     Document Type: Conference Paper
Times cited : (34)

References (24)
  • 1
    • 33746338083 scopus 로고    scopus 로고
    • Version 2.0. Carnegie Mellon University - Software Engineering Institute, Pennsylvania
    • Alberts, C.J., Dorofee, A.J.: OCTAVE Method Implementation Guide Version 2.0. Carnegie Mellon University - Software Engineering Institute, Pennsylvania (2001)
    • (2001) OCTAVE Method Implementation Guide
    • Alberts, C.J.1    Dorofee, A.J.2
  • 2
    • 34548171255 scopus 로고    scopus 로고
    • From Trust to Dependability through Risk Analysis
    • IEEE Computer Society
    • Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From Trust to Dependability through Risk Analysis. In: Proceedings of ARES 2007, pp. 19-26. IEEE Computer Society (2007)
    • (2007) Proceedings of ARES 2007 , pp. 19-26
    • Asnar, Y.1    Giorgini, P.2    Massacci, F.3    Zannone, N.4
  • 3
    • 84911359364 scopus 로고    scopus 로고
    • AS/NZS 4360, Risk management
    • AS/NZS 4360, Risk management. SAI Global (2004)
    • (2004) SAI Global
  • 4
    • 33947368645 scopus 로고    scopus 로고
    • Model-based Security Analysis in Seven Steps-a Guided Tour to the CORAS Method
    • Braber, F., Hogganvik, I., Lund, M.S., Stølen, K., Vraalsen, F.: Model-based Security Analysis in Seven Steps-a Guided Tour to the CORAS Method. BT Technology Journal 25(1), 101-117 (2007)
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stølen, K.4    Vraalsen, F.5
  • 5
    • 84858311224 scopus 로고    scopus 로고
    • Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions
    • Regnell, B., Damian, D. (eds.) REFSQ 2011. Springer, Heidelberg
    • Chowdhury, M.J.M., Matulevičius, R., Sindre, G., Karpati, P.: Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol. 7195, pp. 132-139. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7195 , pp. 132-139
    • Chowdhury, M.J.M.1    Matulevičius, R.2    Sindre, G.3    Karpati, P.4
  • 6
    • 84911355743 scopus 로고    scopus 로고
    • Common Criteria
    • version 2.3, CCMB-2005-08-002
    • Common Criteria version 2.3, Common Criteria for Information Technology Security Evaluation, CCMB-2005-08-002 (2005), http://www.tse.org.tr/turkish/ belgelendirme/ortakkriter/ccpart2v2.3.pdf
    • (2005) Common Criteria for Information Technology Security Evaluation
  • 10
    • 84864680030 scopus 로고    scopus 로고
    • Risk and Business Goal Based Security Requirement and Countermeasure Prioritization
    • Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. Springer, Heidelberg
    • Herrmann, A., Morali, A., Etalle, S., Wieringa, R.: Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 64-76. Springer, Heidelberg (2012)
    • (2012) LNBIP , vol.106 , pp. 64-76
    • Herrmann, A.1    Morali, A.2    Etalle, S.3    Wieringa, R.4
  • 13
    • 45849117958 scopus 로고    scopus 로고
    • Alignment of Misuse Cases with Security Risk Management
    • IEEE
    • Matulevičius, R., Mayer, N., Heymans, P.: Alignment of Misuse Cases with Security Risk Management. In: Proceedings of ARES 2008, pp. 1397-1404. IEEE (2008)
    • (2008) Proceedings of ARES 2008 , pp. 1397-1404
    • Matulevičius, R.1    Mayer, N.2    Heymans, P.3
  • 14
    • 45849134150 scopus 로고    scopus 로고
    • Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development
    • Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. Springer, Heidelberg
    • Matulevičius, R., Mayer, N., Mouratidis, H., Martinez, F.H., Heymans, P., Genon, N.: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 541-555. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5074 , pp. 541-555
    • Matulevičius, R.1    Mayer, N.2    Mouratidis, H.3    Martinez, F.H.4    Heymans, P.5    Genon, N.6
  • 16
    • 70349683196 scopus 로고    scopus 로고
    • Security Requirements Specification in Service-oriented Business Process Management
    • Menzel, M., Thomas, I., Meinel, C.: Security Requirements Specification in Service-oriented Business Process Management. In: ARES 2009, pp. 41-49 (2009)
    • (2009) ARES 2009 , pp. 41-49
    • Menzel, M.1    Thomas, I.2    Meinel, C.3
  • 17
    • 84864647111 scopus 로고    scopus 로고
    • Security Requirements Engineering for Secure Business Processes
    • Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. Springer, Heidelberg
    • Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security Requirements Engineering for Secure Business Processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77-89. Springer, Heidelberg (2012)
    • (2012) LNBIP , vol.106 , pp. 77-89
    • Paja, E.1    Giorgini, P.2    Paul, S.3    Meland, P.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.