-
2
-
-
13544276885
-
Process mining and security: Detecting anomalous process executions and checking process conformance
-
doi:10.1016/j.entcs.2004.10.013
-
van der Aalst, W., de Medeiros, A.: Process mining and security: Detecting anomalous process executions and checking process conformance. ENTCS 121, 3-21 (2005), doi:10.1016/j.entcs.2004.10.013
-
(2005)
ENTCS
, vol.121
, pp. 3-21
-
-
Van Der Aalst, W.1
De Medeiros, A.2
-
3
-
-
47249156187
-
Correctness-preserving configuration of business process models
-
Fiadeiro, J.L., Inverardi, P. (eds.) Springer, Heidelberg
-
van der Aalst, W.M.P., Dumas, M., Gottschalk, F., ter Hofstede, A.H.M., La Rosa, M., Mendling, J.: Correctness-Preserving Configuration of Business Process Models. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol. 4961, pp. 46-61. Springer, Heidelberg (2008)
-
(2008)
FASE 2008. LNCS
, vol.4961
, pp. 46-61
-
-
Van Der Aalst, W.M.P.1
Dumas, M.2
Gottschalk, F.3
Ter Hofstede, A.H.M.4
La Rosa, M.5
Mendling, J.6
-
4
-
-
80054075640
-
InDico: Information flow analysis of business processes for confidentiality requirements
-
Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) Springer, Heidelberg
-
Accorsi, R., Wonnemann, C.: InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 194-209. Springer, Heidelberg (2011)
-
(2011)
STM 2010. LNCS
, vol.6710
, pp. 194-209
-
-
Accorsi, R.1
Wonnemann, C.2
-
5
-
-
79551564021
-
Security validation of busi-́ ness processes via model-checking
-
Erlingsson, U., Wieringa, R., Zannone, N Springer, Heidelberg
-
Arsac, W., Compagna, L., Pellegrino, G., Ponta, S.E.: Security Validation of Busi-́ ness Processes via Model-Checking. In: Erlingsson, U., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 29-42. Springer, Heidelberg (2011)
-
(2011)
ESSoS 2011. LNCS
, vol.6542
, pp. 29-42
-
-
Arsac, W.1
Compagna, L.2
Pellegrino, G.3
Ponta, S.E.4
-
7
-
-
60849104397
-
Automated analysis of security-design models
-
doi:10.1016/j.infsof.2008.05.011; Special Issue on Model-Driven Development for Secure Information Systems
-
Basin, D., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Information and Software Technology 51(5), 815-831 (2009), doi:10.1016/j.infsof.2008.05.011; Special Issue on Model-Driven Development for Secure Information Systems
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
8
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
doi:10.1145/1125808.1125810
-
Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006), doi:10.1145/1125808.1125810
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.A.1
Doser, J.2
Lodderstedt, T.3
-
9
-
-
79960159164
-
An approach to modular and testable security models of real-world health-care applications
-
ACM Press, New York doi:10.1145/1998441.1998461
-
Brucker, A.D., Brügger, L., Kearney, P., Wolff, B.: An approach to modular and testable security models of real-world health-care applications. In: ACM SAC-MAT, pp. 133-142. ACM Press, New York (2011), doi:10.1145/1998441. 1998461
-
(2011)
ACM SAC-MAT
, pp. 133-142
-
-
Brucker, A.D.1
Brügger, L.2
Kearney, P.3
Wolff, B.4
-
10
-
-
70450286943
-
Metamodel-based UML notations for domain-specific languages
-
Favre, J.M., Gasevic, D., L̈ammel, R., Winter, A. (eds.)
-
Brucker, A.D., Doser, J.: Metamodel-based UML notations for domain-specific languages. In: Favre, J.M., Gasevic, D., L̈ammel, R., Winter, A. (eds.) 4th International Workshop on Software Language Engineering (ATEM 2007) (2007)
-
(2007)
4th International Workshop on Software Language Engineering (ATEM 2007)
-
-
Brucker, A.D.1
Doser, J.2
-
11
-
-
33750286091
-
A model transformation semantics and analysis methodology for secureuml
-
Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) Springer, Heidelberg
-
Brucker, A.D., Doser, J., Wolff, B.: A Model Transformation Semantics and Analysis Methodology for SecureUML. In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 306-320. Springer, Heidelberg (2006)
-
(2006)
MoDELS 2006. LNCS
, vol.4199
, pp. 306-320
-
-
Brucker, A.D.1
Doser, J.2
Wolff, B.3
-
12
-
-
84864034347
-
SecureBPMN: Modeling and enforcing access control requirements in business processes
-
ACM Press doi:10.1145/2295136.2295160
-
Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: Modeling and enforcing access control requirements in business processes. In: ACM SACMAT. ACM Press (2012), doi:10.1145/2295136.2295160
-
(2012)
ACM SACMAT
-
-
Brucker, A.D.1
Hang, I.2
Lückemeyer, G.3
Ruparel, R.4
-
13
-
-
70450235104
-
Extending access control models with break-glass
-
Carminati, B., Joshi, J. (eds.) ACM Press doi:10.1145/1542207.1542239
-
Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Carminati, B., Joshi, J. (eds.) ACM SACMAT, pp. 197-206. ACM Press (2009), doi:10.1145/1542207.1542239
-
(2009)
ACM SACMAT
, pp. 197-206
-
-
Brucker, A.D.1
Petritsch, H.2
-
14
-
-
51449094371
-
Semantics and analysis of business process models in BPMN
-
doi:10.1016/j.infsof.2008.02.006
-
Dijkman, R.M., Dumas, M., Ouyang, C.: Semantics and analysis of business process models in BPMN. Information & Software Technology 50(12), 1281-1294 (2008), doi:10.1016/j.infsof.2008.02.006
-
(2008)
Information & Software Technology
, vol.50
, Issue.12
, pp. 1281-1294
-
-
Dijkman, R.M.1
Dumas, M.2
Ouyang, C.3
-
15
-
-
84873175283
-
-
HIPAA: Health Insurance Portability and Accountability Act of 1996
-
HIPAA: Health Insurance Portability and Accountability Act of 1996 (1996), http://www.cms.hhs.gov/HIPAAGenInfo/
-
(1996)
-
-
-
16
-
-
55049118116
-
Model-based security analysis of the german health card architecture
-
Jürjens, J., Rumm, R.: Model-based security analysis of the german health card architecture. Methods Inf. Med. 47(5), 409-416 (2008)
-
(2008)
Methods Inf. Med.
, vol.47
, Issue.5
, pp. 409-416
-
-
Jürjens, J.1
Rumm, R.2
-
17
-
-
70849086808
-
Proactive caching: Generating caching heuristics for business process environments
-
IEEE Computer Society doi:10.1109/CSE.2009.177
-
Kohler, M., Brucker, A.D., Schaad, A.: Proactive Caching: Generating caching heuristics for business process environments. In: International Conference on Computational Science and Engineering (CSE), vol. 3, pp. 207-304. IEEE Computer Society (2009), doi:10.1109/CSE.2009.177
-
(2009)
International Conference on Computational Science and Engineering (CSE)
, vol.3
, pp. 207-304
-
-
Kohler, M.1
Brucker, A.D.2
Schaad, A.3
-
18
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
J́eźequel, J.M., Hussmann, H., Cook, S. (eds.) Springer, Heidelberg
-
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J́eźequel, J.M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
19
-
-
57049148622
-
Automated XACML policy reconfiguration for evaluation optimisation
-
Win, B.D., Lee, S.W., Monga, M. (eds.) ACM doi:10.1145/1370905.1370906
-
Miseldine, P.: Automated XACML policy reconfiguration for evaluation optimisation. In: Win, B.D., Lee, S.W., Monga, M. (eds.) SESS, pp. 1-8. ACM (2008), doi:10.1145/1370905.1370906
-
(2008)
SESS
, pp. 1-8
-
-
Miseldine, P.1
-
20
-
-
79960302857
-
-
Tech. rep. University Karlsruhe KIT
-
Mülle, J., von Stackelberg, S., B̈ohm, K.: A security language for BPMN process models. Tech. rep., University Karlsruhe, KIT (2011)
-
(2011)
A Security Language for BPMN Process Models
-
-
Mülle, J.1
Von Stackelberg, S.2
B̈ohm, K.3
-
21
-
-
84873182763
-
-
OASIS: eXtensible Access Control Markup Language (XACML), version 2.0
-
OASIS: eXtensible Access Control Markup Language (XACML), version 2.0 (2005), http://docs.oasis-open.org/xacml/2.0/XACML-2.0-OS-NORMATIVE.zip
-
(2005)
-
-
-
22
-
-
84873148845
-
-
Object Management Group: Business process model and notation (BPMN), version 2.0 Available as OMG document formal/2011-01-03 2011
-
Object Management Group: Business process model and notation (BPMN), version 2.0 (2011), Available as OMG document formal/2011-01-03
-
-
-
-
23
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
doi:10.1093/ietisy/e90-d.4.745
-
Rodríguez, A., Ferńandez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE-Trans. Inf. Syst. E90-D, 745-752 (2007), doi:10.1093/ietisy/e90-d.4.745
-
(2007)
IEICE-Trans. Inf. Syst. E90-D
, pp. 745-752
-
-
Rodríguez, A.1
Ferńandez-Medina, E.2
Piattini, M.3
-
24
-
-
33646027053
-
Specification and validation of authorisation constraints using UML and OCL
-
De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) Springer, Heidelberg
-
Sohr, K., Ahn, G.J., Gogolla, M., Migge, L.: Specification and Validation of Authorisation Constraints Using UML and OCL. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 64-79. Springer, Heidelberg (2005)
-
(2005)
ESORICS 2005. LNCS
, vol.3679
, pp. 64-79
-
-
Sohr, K.1
Ahn, G.J.2
Gogolla, M.3
Migge, L.4
-
25
-
-
79451469078
-
An approach to capture authorisation requirements in business processes
-
doi:10.1007/s00766-010-0103-y
-
Wolter, C., Meinel, C.: An approach to capture authorisation requirements in business processes. Requir. Eng. 15(4), 359-373 (2010), doi:10.1007/s00766- 010-0103-y
-
(2010)
Requir. Eng.
, vol.15
, Issue.4
, pp. 359-373
-
-
Wolter, C.1
Meinel, C.2
-
26
-
-
63949084590
-
Model-driven business process security requirement specification
-
doi:10.1016/j.sysarc.2008.10.002; Secure Service-Oriented Architectures (Special Issue on Secure SOA
-
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture 55(4), 211-223 (2009), doi:10.1016/j.sysarc.2008.10.002; Secure Service-Oriented Architectures (Special Issue on Secure SOA)
-
(2009)
Journal of Systems Architecture
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
27
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
Alonso, G., Dadam, P., Rosemann, M. (eds.) Springer, Heidelberg
-
Wolter, C., Schaad, A.: Modeling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64-79. Springer, Heidelberg (2007)
-
(2007)
BPM 2007. LNCS
, vol.4714
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
28
-
-
38149139426
-
Deriving XACML policies from business process models
-
Weske, M., Hacid, M.-S., Godart, C. (eds.) Springer, Heidelberg
-
Wolter, C., Schaad, A., Meinel, C.: Deriving XACML Policies from Business Process Models. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE 2007 Workshops. LNCS, vol. 4832, pp. 142-153. Springer, Heidelberg (2007)
-
(2007)
WISE 2007 Workshops. LNCS
, vol.4832
, pp. 142-153
-
-
Wolter, C.1
Schaad, A.2
Meinel, C.3
|