메뉴 건너뛰기




Volumn , Issue , 2012, Pages 49-58

Eliciting security requirements for business processes using patterns

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS MODELS; BUSINESS PROCESS; BUSINESS PROCESS MODELLING; DEVELOPMENT STAGES; SECURITY ENGINEERING; SECURITY REQUIREMENTS; SECURITY RISKS; SECURITY SOLUTIONS;

EID: 84865692876     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 5
    • 84864711339 scopus 로고    scopus 로고
    • Towards definition of secure business processes
    • M. Bajec and J. Eder (Eds.). Springer-Verlag
    • Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards Definition of Secure Business Processes. In: M. Bajec and J. Eder (Eds.): CAiSE 2012 Workshops, LNBIP 112. pp. 1-15. Springer-Verlag (2012)
    • (2012) CAiSE 2012 Workshops, LNBIP 112 , pp. 1-15
    • Altuhhova, O.1    Matulevičius, R.2    Ahmed, N.3
  • 6
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps-a guided tour to the coras method
    • Braber, F., Hogganvik, I., Lund, M. S., Stølen, K., Vraalsen, F.: Model-based security analysis in seven steps-a guided tour to the coras method. BT Technology Journal 25, 101-117 (2007)
    • (2007) BT Technology Journal , vol.25 , pp. 101-117
    • Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stølen, K.4    Vraalsen, F.5
  • 8
    • 84892326872 scopus 로고    scopus 로고
    • A systematic approach to define the domain of information system security risk management
    • Springer
    • Dubois, E., Heymans, P., Mayer, N.and Matuleviv̧ius, R.: A systematic approach to define the domain of information system security risk management. In: Intentional Perspectives on IS Engg., pp. 289-306. Springer (2010)
    • (2010) Intentional Perspectives on IS Engg. , pp. 289-306
    • Dubois, E.1    Heymans, P.2    Mayer, N.3    Matuleviv̧ius, R.4
  • 9
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security trade-offs
    • Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security trade-offs. Security 4801(7), 375-390 (2007)
    • (2007) Security , vol.4801 , Issue.7 , pp. 375-390
    • Elahi, G.1    Yu, E.2
  • 14
  • 15
    • 34247151648 scopus 로고    scopus 로고
    • A bpmn extension for the modeling of security requirements in business processes
    • Rodríguez, A., Fernández-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst. 90-D(4), 745-752 (2007)
    • (2007) IEICE - Trans. Inf. Syst. , vol.90 D , Issue.4 , pp. 745-752
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 16
    • 64249086031 scopus 로고    scopus 로고
    • Security analysis of electronic business processes
    • Röhrig, S., Knorr, K.: Security analysis of electronic business processes. Electronic Commerce Research 4(1-2), 59-81 (2004)
    • (2004) Electronic Commerce Research , vol.4 , Issue.1-2 , pp. 59-81
    • Röhrig, S.1    Knorr, K.2
  • 18
    • 30344442772 scopus 로고    scopus 로고
    • Seven pernicious kingdoms: A taxonomy of software security errors
    • Tsipenyuk, K., Chess, B., McGraw, G.: Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security & Privacy 3(6), 81-84 (2005)
    • (2005) IEEE Security & Privacy , vol.3 , Issue.6 , pp. 81-84
    • Tsipenyuk, K.1    Chess, B.2    McGraw, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.