-
4
-
-
84865685837
-
A template of security risk patterns for business processes
-
Riga Technical University
-
Ahmed, N., Matulevičius, R.: A template of security risk patterns for business processes. In: Perspectives in Business Informatics Research, Riga, Latvia. pp. 123-130. Riga Technical University (2011)
-
(2011)
Perspectives in Business Informatics Research, Riga, Latvia
, pp. 123-130
-
-
Ahmed, N.1
Matulevičius, R.2
-
5
-
-
84864711339
-
Towards definition of secure business processes
-
M. Bajec and J. Eder (Eds.). Springer-Verlag
-
Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards Definition of Secure Business Processes. In: M. Bajec and J. Eder (Eds.): CAiSE 2012 Workshops, LNBIP 112. pp. 1-15. Springer-Verlag (2012)
-
(2012)
CAiSE 2012 Workshops, LNBIP 112
, pp. 1-15
-
-
Altuhhova, O.1
Matulevičius, R.2
Ahmed, N.3
-
6
-
-
33947368645
-
Model-based security analysis in seven steps-a guided tour to the coras method
-
Braber, F., Hogganvik, I., Lund, M. S., Stølen, K., Vraalsen, F.: Model-based security analysis in seven steps-a guided tour to the coras method. BT Technology Journal 25, 101-117 (2007)
-
(2007)
BT Technology Journal
, vol.25
, pp. 101-117
-
-
Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stølen, K.4
Vraalsen, F.5
-
8
-
-
84892326872
-
A systematic approach to define the domain of information system security risk management
-
Springer
-
Dubois, E., Heymans, P., Mayer, N.and Matuleviv̧ius, R.: A systematic approach to define the domain of information system security risk management. In: Intentional Perspectives on IS Engg., pp. 289-306. Springer (2010)
-
(2010)
Intentional Perspectives on IS Engg.
, pp. 289-306
-
-
Dubois, E.1
Heymans, P.2
Mayer, N.3
Matuleviv̧ius, R.4
-
9
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security trade-offs. Security 4801(7), 375-390 (2007)
-
(2007)
Security
, vol.4801
, Issue.7
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
12
-
-
84865690569
-
Security risk oriented patterns
-
04
-
Khan, N. H., Ahmed, N., Matulevičius, R.: Security Risk Oriented Patterns. Tech. rep., University of Tartu, Department of Computer Sciences (04 2012), http://www.cs.ut.ee/-naved/Security Risk Oriented Patterns.pdf
-
(2012)
Tech. Rep. University of Tartu Department of Computer Sciences
-
-
Khan, N.H.1
Ahmed, N.2
Matulevičius, R.3
-
13
-
-
84865695950
-
Security requirements engineering for business processes
-
Riga Technical University
-
Paja, E., Giorgini, P., Paul, S., Meland, P. H.: Security requirements engineering for business processes. In: Perspectives in Business Informatics Research, Riga, Latvia. pp. 163-170. Riga Technical University (2011)
-
(2011)
Perspectives in Business Informatics Research, Riga, Latvia.
, pp. 163-170
-
-
Paja, E.1
Giorgini, P.2
Paul, S.3
Meland, P.H.4
-
14
-
-
67249127965
-
Non-functional requirements in business process modeling
-
APCCM, Australian Computer Society, Inc.
-
Pavlovski, C. J., Zou, J.: Non-functional requirements in business process modeling. In: Proceedings of the 5th Asia-Pacific conf. on Conceptual Modelling. pp. 103-112. APCCM, Australian Computer Society, Inc. (2008)
-
(2008)
Proceedings of the 5th Asia-Pacific Conf. on Conceptual Modelling
, pp. 103-112
-
-
Pavlovski, C.J.1
Zou, J.2
-
15
-
-
34247151648
-
A bpmn extension for the modeling of security requirements in business processes
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst. 90-D(4), 745-752 (2007)
-
(2007)
IEICE - Trans. Inf. Syst.
, vol.90 D
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
16
-
-
64249086031
-
Security analysis of electronic business processes
-
Röhrig, S., Knorr, K.: Security analysis of electronic business processes. Electronic Commerce Research 4(1-2), 59-81 (2004)
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 59-81
-
-
Röhrig, S.1
Knorr, K.2
-
17
-
-
33750050331
-
-
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering (2006)
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
18
-
-
30344442772
-
Seven pernicious kingdoms: A taxonomy of software security errors
-
Tsipenyuk, K., Chess, B., McGraw, G.: Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security & Privacy 3(6), 81-84 (2005)
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.6
, pp. 81-84
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
|