-
6
-
-
38349027223
-
Specifying process-aware access control rules in SBVR
-
LCNS, Springer
-
Goedertier, S., Mues, C., Vanthienen, J. 2007. "Specifying process-aware access control rules in SBVR, " Proc. of the International Symposium on Rule Interchange and Applications (RuleML '07, LCNS 4824, Springer, pp 39-52.
-
(2007)
Proc. of the International Symposium on Rule Interchange and Applications (RuleML '07)
, vol.4824
, pp. 39-52
-
-
Goedertier, S.1
Mues, C.2
Vanthienen, J.3
-
7
-
-
29544446298
-
Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799
-
December
-
Haworth, D.A., Pietron, L.R. 2006. "Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799, " Information Systems Management (23:1), December, pp 73-87.
-
(2006)
Information Systems Management
, vol.23
, Issue.1
, pp. 73-87
-
-
Haworth, D.A.1
Pietron, L.R.2
-
8
-
-
33749367621
-
Security Requirement Analysis of Business Processes
-
October
-
Herrmann, P., Herrmann, G. 2006. "Security Requirement Analysis of Business Processes, " Electronic Commerce Research (6:3-4), October, pp 305-335.
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.3-4
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
9
-
-
84870541991
-
Business Process Management: A Research Overview and Analysis
-
Paper 785
-
Ho, Danny Ting-Yi., Jin, Yulong. 2009. "Business Process Management: A Research Overview and Analysis, " Proc. of AMCIS '09, Paper 785.
-
(2009)
Proc. of AMCIS '09
-
-
Ting-Yi, H.D.1
Yulong, J.2
-
13
-
-
79960294968
-
A Business Process-based Modelling Extension for Regulatory Compliance
-
Karagiannis, D. 2008. "A Business Process-based Modelling Extension for Regulatory Compliance, " Multikonferenz Wirtschaftsinformatik (MKWI '08), pp 1159-1173.
-
(2008)
Multikonferenz Wirtschaftsinformatik (MKWI '08)
, pp. 1159-1173
-
-
Karagiannis, D.1
-
14
-
-
84885005456
-
Towards a Framework for Semantic Business Process Compliance Management
-
Kharbili, M.E., Stein, S., Markovic, I. Pulvermüller, E. 2008, "Towards a Framework for Semantic Business Process Compliance Management, " Proc. of the First International Workshop on Governance, Risk and Compliance (GRCIS '08), pp 1-15.
-
(2008)
Proc. of the First International Workshop on Governance, Risk and Compliance (GRCIS '08)
, pp. 1-15
-
-
Kharbili, M.E.1
Stein, S.2
Markovic, I.3
Pulvermüller, E.4
-
16
-
-
84869134860
-
A Rule-Based Framework Using Role Patterns for Business Process Compliance
-
Springer
-
Kumar, A., Liu, R. 2008. "A Rule-Based Framework Using Role Patterns for Business Process Compliance, " Proc. of the International Symposium on Rule Representation, Interchange and Reasoning on the Web (RuleML '08), LCNS 2460, Springer, pp 426-441.
-
(2008)
Proc. of the International Symposium on Rule Representation, Interchange and Reasoning on the Web (RuleML '08)
, pp. 426-441
-
-
Kumar, A.1
Liu, R.2
-
17
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
LCNS 2460, Springer
-
th International Conference of the Unified Modeling Language, (UML'02), LCNS 2460, Springer, pp 426-441.
-
(2002)
th International Conference of the Unified Modeling Language, (UML'02)
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
18
-
-
33750957085
-
Secure Business Process Management: A Roadmap
-
Neubauer, T., Klemen, M.D., Biffl, S. 2006. "Secure Business Process Management: A Roadmap", Proc. of the First International Conference on Availability, Reliability and Security (ARES '06), pp 457-464.
-
(2006)
Proc. of the First International Conference on Availability, Reliability and Security (ARES '06)
, pp. 457-464
-
-
Neubauer, T.1
Klemen, M.D.2
Biffl, S.3
-
19
-
-
0032124052
-
Modelling Data Secrecy and Integrity
-
July
-
Pernul, G., Tjoa, A.M., Winiwarter, W. 1998. "Modelling Data Secrecy and Integrity, " Data & Knowledge Enineering (26:3), July, pp 291-308.
-
(1998)
Data & Knowledge Enineering
, vol.26
, Issue.3
, pp. 291-308
-
-
Pernul, G.1
Tjoa, A.M.2
Winiwarter, W.3
-
20
-
-
34247151648
-
A BPMN Extension for the Modeling of Security Requirements in Business Processes
-
March
-
Rodríguez, A., Fernández-Medina, E., Piattini, M. 2007a. "A BPMN Extension for the Modeling of Security Requirements in Business Processes, " IEICE Transactions (90-D:4), March, pp 745-752.
-
(2007)
IEICE Transactions
, vol.90
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
21
-
-
38949100023
-
An MDA Approach to Develop Secure Business Processes through a UML 2.0 Extension
-
September
-
Rodríguez, A., Fernández-Medina, E., Piattini, M. 2007b. "An MDA Approach to Develop Secure Business Processes through a UML 2.0 Extension, " Computer Systems Science & Engineering (22:5), September, pp 308-320.
-
(2007)
Computer Systems Science & Engineering
, vol.22
, Issue.5
, pp. 308-320
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
23
-
-
64249086031
-
Security Analysis of Electronic Business Processes
-
January-April
-
Röhrig, S., Knorr, K. 2004. "Security Analysis of Electronic Business Processes, " Electronic Commerce Research (4:1-2), January-April, pp 59-81.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 59-81
-
-
Röhrig, S.1
Knorr, K.2
-
25
-
-
44649172442
-
Do secure Information System Design Methods Provide Adequate Modeling Support?
-
August
-
Siponen, M.T., Heikkar, J. 2008. "Do secure Information System Design Methods Provide Adequate Modeling Support?, " Information & Software Technology (50:9-10), August, pp 1034-1053.
-
(2008)
Information & Software Technology
, vol.50
, Issue.9-10
, pp. 1034-1053
-
-
Siponen, M.T.1
Heikkar, J.2
-
26
-
-
0036568021
-
Data pricacy approaches from US and EU perspectives
-
May
-
Steinke, G. 2002. "Data pricacy approaches from US and EU perspectives, " Telematics and Informatics (19:2), May, pp 193-200.
-
(2002)
Telematics and Informatics
, vol.19
, Issue.2
, pp. 193-200
-
-
Steinke, G.1
-
27
-
-
84891584174
-
-
Wiley, Hoboken, New Jersey
-
Tarantino, A. 2008. Governance, Risk and Compliance Handbook: Technology, finance, Environmental, and International Guidance and Best Practices, Wiley, Hoboken, New Jersey.
-
(2008)
Governance, Risk and Compliance Handbook: Technology, finance, Environmental, and International Guidance and Best Practices
-
-
Tarantino, A.1
-
28
-
-
33751436350
-
DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems
-
May
-
Wainer, J., Kumar, A., Barthelmess, P. 2007. "DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems, " Information Systems (32:3), May, pp 365-384.
-
(2007)
Information Systems
, vol.32
, Issue.3
, pp. 365-384
-
-
Wainer, J.1
Kumar, A.2
Barthelmess, P.3
-
29
-
-
63949084590
-
Model-Driven Business Process Security Requirement Specification
-
April
-
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C. 2009. "Model-Driven Business Process Security Requirement Specification, " Journal of Systems Architecture-Embedded Systems Design (55:4), April, pp 211-223.
-
(2009)
Journal of Systems Architecture-Embedded Systems Design
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
|