메뉴 건너뛰기




Volumn , Issue , 2008, Pages 249-265

Secure activity resource coordination: A method to design secure business processes

Author keywords

Activity resource coordination; Role based access control; Secure business process; Secure systems design; Security awareness

Indexed keywords

ACTIVITY-RESOURCE COORDINATION; BUSINESS PROCESS; ROLE-BASED ACCESS CONTROL; SECURE SYSTEM; SECURITY AWARENESS;

EID: 84880146008     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (39)
  • 1
    • 0033160014 scopus 로고    scopus 로고
    • Comprehending object and process models: An empirical study
    • July/August
    • Agarwal, R., De, P., and Sinha, A. "Comprehending Object and Process Models: An Empirical Study," IEEE Transactions on Software Engineering, (25:4), July/August 1999, pp. 541-556.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.4 , pp. 541-556
    • Agarwal, R.1    De, P.2    Sinha, A.3
  • 2
    • 33750169459 scopus 로고    scopus 로고
    • The effects of state-based data representation on user performance in query formulation tasks
    • Allen, G. and S., March "The Effects of State-Based Data Representation on User Performance in Query Formulation Tasks," MIS Quarterly, (30:2), 2006, pp. 269-290.
    • (2006) MIS Quarterly , vol.30 , Issue.2 , pp. 269-290
    • Allen, G.1    March, S.2
  • 5
    • 1942532238 scopus 로고    scopus 로고
    • XML-based specification for web services document security
    • Bhatti, R, Bertino, E., Ghafoor, Joshi, J. "XML-Based Specification for Web Services Document Security," IEEE Computer Society, (34:4), 2004, pp.41-49.
    • (2004) IEEE Computer Society , vol.34 , Issue.4 , pp. 41-49
    • Bhatti, R.1    Bertino, E.2    Ghafoor3    Joshi, J.4
  • 6
    • 84976852456 scopus 로고
    • Studying programmer behavior experimentally: The problems of proper methodology
    • Apr.
    • Brooks, R. "Studying Programmer Behavior Experimentally: The Problems of Proper Methodology", Communication of ACM, (23: 4), pp. 207-213, Apr. 1980.
    • (1980) Communication of ACM , vol.23 , Issue.4 , pp. 207-213
    • Brooks, R.1
  • 8
    • 34247140996 scopus 로고    scopus 로고
    • The interdisciplinary study of coordination
    • Malone, T. W., Crowston, K., and Herman, G. A., editors MIT Press, Cambridge, Massachusetts.
    • Crowston, K. and Osborn, C. "The Interdisciplinary Study of Coordination," in Malone, T. W., Crowston, K., and Herman, G. A., editors, Organizing business knowledge: the MIT process handbook, MIT Press, Cambridge, Massachusetts. 2003.
    • (2003) Organizing Business Knowledge: The MIT Process Handbook
    • Crowston, K.1    Osborn, C.2
  • 10
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G. and J., Backhouse "Current Directions in IS Security Research: Towards Socio-Organizational Perspectives," Information Systems Journal, (11), 2001, pp. 127-153.
    • (2001) Information Systems Journal , Issue.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 11
    • 0029004440 scopus 로고
    • Toward a theory of situational awareness in dynamic systems
    • Endsley, M.R. "Toward a theory of Situational Awareness in dynamic systems," Human Factors (37:1) 1995, pp 32-64
    • (1995) Human Factors , vol.37 , Issue.1 , pp. 32-64
    • Endsley, M.R.1
  • 13
    • 0000391283 scopus 로고
    • Within-subjects designs: To use or not to use?
    • Sept.
    • Greenwald, A. "Within-Subjects Designs: To Use or Not to Use?" Psychological Bull., (83:2), Sept. 1976.
    • (1976) Psychological Bull , vol.83 , Issue.2
    • Greenwald, A.1
  • 14
    • 0036779153 scopus 로고    scopus 로고
    • AutoWF: A secure web workflow system using autonomous objects?
    • Gudes, E., and A. Tubman "AutoWF: A Secure Web Workflow System Using Autonomous Objects? Data and Knowledge Engineering (43), 2002, pp. 1-27.
    • (2002) Data and Knowledge Engineering , Issue.43 , pp. 1-27
    • Gudes, E.1    Tubman, A.2
  • 15
    • 35648979668 scopus 로고    scopus 로고
    • Variations in conceptual modeling: Classification and ontological analysis
    • August
    • Hadar, I. and P., Soffer "Variations in Conceptual Modeling: Classification and Ontological Analysis," Journal of the Association for Information Systems, (7:8), August 2006, pp. 568-592.
    • (2006) Journal of the Association for Information Systems , vol.7 , Issue.8 , pp. 568-592
    • Hadar, I.1    Soffer, P.2
  • 17
    • 0242652022 scopus 로고    scopus 로고
    • Design science research in information systems
    • March
    • Hevner, A., March, S.T., Park, J., and Ram, S. "Design Science Research in Information Systems," MIS Quarterly (28:1), March 2004, pp. 75-105.
    • (2004) MIS Quarterly , vol.28 , Issue.1 , pp. 75-105
    • Hevner, A.1    March, S.T.2    Park, J.3    Ram, S.4
  • 19
    • 56749094570 scopus 로고
    • A handbook for data analysis in the behavioural sciences-methodological issues
    • chapter 19 Lawrence Erlbaum, Associates
    • Keren, G. A Handbook for Data Analysis in the Behavioural Sciences-Methodological Issues, chapter 19: Between-or Within-Subjects Design: A Methodological Dilemma. Lawrence Erlbaum, Associates, 1993.
    • (1993) Between-or Within-Subjects Design: A Methodological Dilemma
    • Keren, G.1
  • 20
    • 13844297037 scopus 로고    scopus 로고
    • Meta workflows as a control and coordination mechanism for exception handling in workflow systems
    • Kumar, A. and Wainer, J. "Meta workflows as a Control and Coordination Mechanism for Exception Handling in Workflow Systems," Decision Support Systems (40:1), 2005, pp. 89-105.
    • (2005) Decision Support Systems , vol.40 , Issue.1 , pp. 89-105
    • Kumar, A.1    Wainer, J.2
  • 21
    • 0035331644 scopus 로고    scopus 로고
    • An internally replicated quasi-experiment comparison of checklist and perspective-based reading of code documents
    • May
    • Laitenberger, O., El Emam, K., Harbich, T. "An Internally Replicated Quasi-Experiment Comparison of Checklist and Perspective-Based Reading of Code Documents," IEEE Transactions on Software Engineering, (27:5) May. 2001.
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.5
    • Laitenberger, O.1    El Emam, K.2    Harbich, T.3
  • 22
    • 0242592090 scopus 로고
    • Why a diagram is (Sometimes) worth ten thousand words
    • Larkin J.H. and H.A., Simon "Why a Diagram Is (Sometimes) Worth Ten Thousand Words," Cognitive Science, (11), 1987, pp. 65-99
    • (1987) Cognitive Science , Issue.11 , pp. 65-99
    • Larkin, J.H.1    Simon, H.A.2
  • 23
    • 0036305007 scopus 로고    scopus 로고
    • Integrating software lifecycle process standards with security engineering
    • Lee, Y., Lee, J., and Lee, Z. (2002) "Integrating Software Lifecycle Process Standards with Security Engineering," Computer and Security, (21:4), pp. 345-355.
    • (2002) Computer and Security , vol.21 , Issue.4 , pp. 345-355
    • Lee, Y.1    Lee, J.2    Lee, Z.3
  • 26
    • 0023366168 scopus 로고
    • Electronic markets and electronic hierarchies
    • Malone, T. W., Yates, J., and Benjamin, R. I. "Electronic Markets and Electronic Hierarchies," Communications of the ACM, (30:6), 1987, pp. 484-497.
    • (1987) Communications of the ACM , vol.30 , Issue.6 , pp. 484-497
    • Malone, T.W.1    Yates, J.2    Benjamin, R.I.3
  • 28
    • 23944475544 scopus 로고    scopus 로고
    • When security meets software engineering: A case of modelling secure information systems
    • Mouratidis, H., Giorgini, P., and Manson, G. "When Security Meets Software Engineering: A Case of Modelling Secure Information Systems," Information Systems (30), pp. 609-629.
    • Information Systems , Issue.30 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 29
    • 0042211798 scopus 로고
    • Conceptual modeling and telos
    • Chapter 2 in P. Loucopoulos and R. Zicari (Ed.) UK: Wiley
    • Mylopoulos, J. "Conceptual Modeling and Telos", Chapter 2 in P. Loucopoulos and R. Zicari (Ed.), Conceptual Modeling, Databases, and CASE. UK: Wiley, pp. 49-68. 1992.
    • (1992) Conceptual Modeling, Databases, and CASE , pp. 49-68
    • Mylopoulos, J.1
  • 30
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • September
    • Oh, S. and Park, S. "Task-role-based Access Control Model," Information Systems, (28:6), September 2003, pp. 533-562.
    • (2003) Information Systems , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 31
    • 0000842614 scopus 로고
    • How information gives you competitive advantage
    • July/August
    • Porter, M.E., Millar, V.E. "How Information Gives You Competitive Advantage", Harvard Business Review (63:4), July/August 1985.
    • (1985) Harvard Business Review , vol.63 , Issue.4
    • Porter, M.E.1    Millar, V.E.2
  • 32
    • 84906925269 scopus 로고    scopus 로고
    • A business process context for knowledge management
    • In press
    • Raghu, T.S. and A., Vinze "A Business Process Context for Knowledge Management," Decision Support System, In press.
    • Decision Support System
    • Raghu, T.S.1    Vinze, A.2
  • 34
    • 33646894100 scopus 로고    scopus 로고
    • Semantic information assurance for secure distributed knowledge management: A business process perspective
    • Singh, R. and Salam, A.F. "Semantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective" IEEE Transactions on Systems, Man and Cybernetics (36:3), 2006, pp. 472-486.
    • (2006) IEEE Transactions on Systems, Man and Cybernetics , vol.36 , Issue.3 , pp. 472-486
    • Singh, R.1    Salam, A.F.2
  • 37
    • 79951820897 scopus 로고    scopus 로고
    • Framing of information security policies and practices
    • D. Straub, S. Goodman and R. Baskerville (eds.) Armonk, NY: M. E. Sharpe
    • Straub, D., Goodman, S., and Baskerville, R. "Framing of Information Security Policies and Practices," in Information Security Policies, Processes, and Practices, D. Straub, S. Goodman and R. Baskerville (eds.), 2008, Armonk, NY: M. E. Sharpe.
    • (2008) Information Security Policies, Processes, and Practices
    • Straub, D.1    Goodman, S.2    Baskerville, R.3
  • 38
    • 0038301528 scopus 로고    scopus 로고
    • XML based schema definition for support of inter-organizational workflow
    • van der Aalst, W.M.P. and Kumar, A. "XML Based Schema Definition for Support of Inter-Organizational Workflow," Information Systems Research (14:1), 2003, pp.23-46.
    • (2003) Information Systems Research , vol.14 , Issue.1 , pp. 23-46
    • Van Der Aalst, W.M.P.1    Kumar, A.2
  • 39
    • 27644524446 scopus 로고    scopus 로고
    • Bridging the gap between software development and information security
    • Sept-Oct
    • van Wyk, K. and G., McGraw "Bridging the Gap Between Software Development and Information Security," IEEE Security & Privacy, Sept-Oct 2005, pp. 75-79.
    • (2005) IEEE Security & Privacy , pp. 75-79
    • Van Wyk, K.1    McGraw, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.