메뉴 건너뛰기




Volumn , Issue , 2013, Pages

A taxonomy for assessing security in business process modelling

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS MODELLING; BUSINESS PROCESS; BUSINESS PROCESS MODEL; DESIGN AND IMPLEMENTATIONS; PROCESS DEVELOPMENT; SECURITY ENGINEERING; SECURITY IN BUSINESS PROCESS; SECURITY PATTERNS;

EID: 84884168441     PISSN: 21511349     EISSN: 21511357     Source Type: Conference Proceeding    
DOI: 10.1109/RCIS.2013.6577700     Document Type: Conference Paper
Times cited : (13)

References (44)
  • 1
    • 84884155893 scopus 로고    scopus 로고
    • Merriam-Webster Online Dictionary
    • "Merriam-Webster Online Dictionary," available at http://www.m-w.com.
  • 2
    • 84929572604 scopus 로고
    • Information technology security evaluation criteria, Tech. Rep. version 1.2
    • "Information technology security evaluation criteria," Commission of European Communities, Tech. Rep. version 1.2, 1991.
    • (1991) Commission of European Communities
  • 14
    • 0026923229 scopus 로고
    • Process modeling
    • B. Curtis, M. I. Kellner, and J. Over, "Process modeling," Commun. ACM, vol. 35, no. 9, pp. 75-90, 1992.
    • (1992) Commun. ACM , vol.35 , Issue.9 , pp. 75-90
    • Curtis, B.1    Kellner, M.I.2    Over, J.3
  • 15
    • 78649464425 scopus 로고    scopus 로고
    • Similarity of business process models: Metrics and evaluation
    • R. Dijkman, M. Dumas, B. van Dongen, R. Kaarik, and J. Mendling, "Similarity of Business Process Models: Metrics and Evaluation," Information Systems, vol. 36, no. 2, pp. 498-516, 2011.
    • (2011) Information Systems , vol.36 , Issue.2 , pp. 498-516
    • Dijkman, R.1    Dumas, M.2    Van Dongen, B.3    Kaarik, R.4    Mendling, J.5
  • 18
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • D. Firesmith, "Specifying Reusable Security Requirements," Journal of Object Technology, vol. 3, no. 1, pp. 61-75, 2004.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 20
    • 0035300743 scopus 로고    scopus 로고
    • A Taxonomy of business process modeling and information systems modeling techniques
    • G. M. Giaglis, "A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques," International Journal of Flexible Manufacturing Systems, vol. 13, pp. 209-228, 2001.
    • (2001) International Journal of Flexible Manufacturing Systems , vol.13 , pp. 209-228
    • Giaglis, G.M.1
  • 21
    • 34547107609 scopus 로고    scopus 로고
    • Organizing security patterns
    • M. Hafiz, P. Adamczyk, and R. Johnson, "Organizing security patterns," Software, IEEE, vol. 24, no. 4, pp. 52-60, 2007.
    • (2007) Software, IEEE , vol.24 , Issue.4 , pp. 52-60
    • Hafiz, M.1    Adamczyk, P.2    Johnson, R.3
  • 24
    • 68949173234 scopus 로고    scopus 로고
    • Taxonomies of attacks and vulnerabilities in computer systems
    • V. Igure and R. Williams, "Taxonomies of Attacks and Vulnerabilities in Computer Systems," Communications Surveys Tutorials, IEEE, vol. 10, no. 1, pp. 6-19, 2008.
    • (2008) Communications Surveys Tutorials, IEEE , vol.10 , Issue.1 , pp. 6-19
    • Igure, V.1    Williams, R.2
  • 26
    • 78650393263 scopus 로고    scopus 로고
    • Business process-based information security risk assessment
    • Australia. IEEE Computer Society
    • K. Khanmohammadi and S. H. Houmb, "Business Process-Based Information Security Risk Assessment," in NSS-4, Australia. IEEE Computer Society, 2010, pp. 199-206.
    • (2010) NSS-4 , pp. 199-206
    • Khanmohammadi, K.1    Houmb, S.H.2
  • 28
  • 30
    • 0346639662 scopus 로고    scopus 로고
    • A conceptual framework for understanding business processes and business process modelling
    • N. Melao and M. Pidd, "A conceptual framework for understanding business processes and business process modelling," Information Systems Journal, vol. 10, no. 2, pp. 105-129, 2000.
    • (2000) Information Systems Journal , vol.10 , Issue.2 , pp. 105-129
    • Melao, N.1    Pidd, M.2
  • 31
    • 84884143682 scopus 로고    scopus 로고
    • OMG, Meta Object Facility (MOF) Core Specification Version 2.0, 2006
    • OMG, Meta Object Facility (MOF) Core Specification Version 2.0, 2006.
  • 33
    • 79952955347 scopus 로고    scopus 로고
    • Towards adaptability and control for knowledge-intensive business processes: Declarative configurable process specifications
    • I. Rychkova and S. Nurcan, "Towards Adaptability and Control for Knowledge-Intensive Business Processes: Declarative Configurable Process Specifications," in System Sciences (HICSS), 2011 44th Hawaii International Conference on, 2011, pp. 1-10.
    • (2011) System Sciences (HICSS), 2011 44th Hawaii International Conference on , pp. 1-10
    • Rychkova, I.1    Nurcan, S.2
  • 36
    • 0000091416 scopus 로고
    • Extending and formalizing the framework for information systems architecture
    • J. F. Sowa and J. A. Zachman, "Extending and formalizing the framework for information systems architecture," IBM Syst. J., vol. 31, no. 3, pp. 590-616, 1992.
    • (1992) IBM Syst. J. , vol.31 , Issue.3 , pp. 590-616
    • Sowa, J.F.1    Zachman, J.A.2
  • 40
    • 80055041481 scopus 로고    scopus 로고
    • A Model-driven engineering approach with diagnosis of non-conformance of security objectives in business process models
    • may
    • A. Varela-Vaca, R. Gasca, and A. Jimenez-Ramirez, "A Model-Driven Engineering Approach with Diagnosis of Non-Conformance of Security Objectives in Business Process Models," in Proc. of RCIS 2011, may 2011, pp. 1-6.
    • (2011) Proc. of RCIS 2011 , pp. 1-6
    • Varela-Vaca, A.1    Gasca, R.2    Jimenez-Ramirez, A.3
  • 43
    • 0001134191 scopus 로고
    • A framework for information systems architecture
    • J. A. Zachman, "A framework for information systems architecture," IBM Syst. J., vol. 26, no. 3, pp. 276-292, 1987.
    • (1987) IBM Syst. J. , vol.26 , Issue.3 , pp. 276-292
    • Zachman, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.