-
1
-
-
84884155893
-
-
Merriam-Webster Online Dictionary
-
"Merriam-Webster Online Dictionary," available at http://www.m-w.com.
-
-
-
-
2
-
-
84929572604
-
-
Information technology security evaluation criteria, Tech. Rep. version 1.2
-
"Information technology security evaluation criteria," Commission of European Communities, Tech. Rep. version 1.2, 1991.
-
(1991)
Commission of European Communities
-
-
-
5
-
-
2642532761
-
Business process modelling: Review and framework
-
R. S. Aguilar-Saven, "Business process modelling: Review and framework," International Journal of Production Economics, vol. 90, no. 2, pp. 129-149, 2004.
-
(2004)
International Journal of Production Economics
, vol.90
, Issue.2
, pp. 129-149
-
-
Aguilar-Saven, R.S.1
-
9
-
-
84857044666
-
Process classification frameworks
-
Springer Berlin Heidelberg
-
C. Aitken, C. Stephenson, and R. Brinkworth, "Process Classification Frameworks," in Handbook on Business Process Management 2, ser. International Handbooks on Information Systems. Springer Berlin Heidelberg, 2010, pp. 73-92.
-
(2010)
Handbook on Business Process Management 2, Ser. International Handbooks on Information Systems
, pp. 73-92
-
-
Aitken, C.1
Stephenson, C.2
Brinkworth, R.3
-
10
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," Dependable and Secure Computing, IEEE Transactions on, vol. 1, no. 1, pp. 11-33, 2004.
-
(2004)
Dependable and Secure Computing, IEEE Transactions on
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
11
-
-
0004101993
-
-
New York, NY, USA: John Wiley & Sons, Inc.
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-oriented software architecture: a system of patterns. New York, NY, USA: John Wiley & Sons, Inc., 1996.
-
(1996)
Pattern-oriented Software Architecture: A System of Patterns
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
12
-
-
33645586196
-
Using security patterns to model and analyze security
-
B. H. C. Cheng, S. Konrad, L. A. Campbell, and R.Wassermann, "Using security patterns to model and analyze security," in In IEEE Workshop on Requirements for High Assurance Systems, 2003, pp. 13-22.
-
(2003)
IEEE Workshop on Requirements for High Assurance Systems
, pp. 13-22
-
-
Cheng, B.H.C.1
Konrad, S.2
Campbell, L.A.3
Wassermann, R.4
-
13
-
-
77955072995
-
Incorporating risk into business process models
-
E. W. Cope, J. M. Kuster, D. Etzweiler, L. A. Deleris, and B. Ray, "Incorporating Risk into Business Process Models," IBM J. Res. Dev., vol. 54, no. 3, 2010.
-
(2010)
IBM J. Res. Dev.
, vol.54
, Issue.3
-
-
Cope, E.W.1
Kuster, J.M.2
Etzweiler, D.3
Deleris, L.A.4
Ray, B.5
-
14
-
-
0026923229
-
Process modeling
-
B. Curtis, M. I. Kellner, and J. Over, "Process modeling," Commun. ACM, vol. 35, no. 9, pp. 75-90, 1992.
-
(1992)
Commun. ACM
, vol.35
, Issue.9
, pp. 75-90
-
-
Curtis, B.1
Kellner, M.I.2
Over, J.3
-
15
-
-
78649464425
-
Similarity of business process models: Metrics and evaluation
-
R. Dijkman, M. Dumas, B. van Dongen, R. Kaarik, and J. Mendling, "Similarity of Business Process Models: Metrics and Evaluation," Information Systems, vol. 36, no. 2, pp. 498-516, 2011.
-
(2011)
Information Systems
, vol.36
, Issue.2
, pp. 498-516
-
-
Dijkman, R.1
Dumas, M.2
Van Dongen, B.3
Kaarik, R.4
Mendling, J.5
-
16
-
-
45849131316
-
Measuring similarity between business process models
-
Berlin, Heidelberg: Springer-Verlag
-
B. Dongen, R. Dijkman, and J. Mendling, "Measuring Similarity between Business Process Models," in Proceedings of the 20th international conference on Advanced Information Systems Engineering, ser. CAiSE '08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 450-464.
-
(2008)
Proceedings of the 20th International Conference on Advanced Information Systems Engineering, Ser. CAiSE '08
, pp. 450-464
-
-
Dongen, B.1
Dijkman, R.2
Mendling, J.3
-
17
-
-
84866412312
-
Approximate clone detection in repositories of business process models
-
A. Barros, A. Gal, and E. Kindler, Eds. Springer Berlin Heidelberg
-
C. C. Ekanayake, M. Dumas, L. Garc?a-Banuelos, M. Rosa, and A. H. Hofstede, "Approximate Clone Detection in Repositories of Business Process Models," in Business Process Management, ser. Lecture Notes in Computer Science, A. Barros, A. Gal, and E. Kindler, Eds. Springer Berlin Heidelberg, 2012, vol. 7481, pp. 302-318.
-
(2012)
Business Process Management, Ser. Lecture Notes in Computer Science
, vol.7481
, pp. 302-318
-
-
Ekanayake, C.C.1
Dumas, M.2
Garca-Banuelos, L.3
Rosa, M.4
Hofstede, A.H.5
-
18
-
-
2942753973
-
Specifying reusable security requirements
-
D. Firesmith, "Specifying Reusable Security Requirements," Journal of Object Technology, vol. 3, no. 1, pp. 61-75, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
19
-
-
0003880013
-
-
Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc.
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design patterns: elements of reusable object-oriented software. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
20
-
-
0035300743
-
A Taxonomy of business process modeling and information systems modeling techniques
-
G. M. Giaglis, "A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques," International Journal of Flexible Manufacturing Systems, vol. 13, pp. 209-228, 2001.
-
(2001)
International Journal of Flexible Manufacturing Systems
, vol.13
, pp. 209-228
-
-
Giaglis, G.M.1
-
21
-
-
34547107609
-
Organizing security patterns
-
M. Hafiz, P. Adamczyk, and R. Johnson, "Organizing security patterns," Software, IEEE, vol. 24, no. 4, pp. 52-60, 2007.
-
(2007)
Software, IEEE
, vol.24
, Issue.4
, pp. 52-60
-
-
Hafiz, M.1
Adamczyk, P.2
Johnson, R.3
-
24
-
-
68949173234
-
Taxonomies of attacks and vulnerabilities in computer systems
-
V. Igure and R. Williams, "Taxonomies of Attacks and Vulnerabilities in Computer Systems," Communications Surveys Tutorials, IEEE, vol. 10, no. 1, pp. 6-19, 2008.
-
(2008)
Communications Surveys Tutorials, IEEE
, vol.10
, Issue.1
, pp. 6-19
-
-
Igure, V.1
Williams, R.2
-
26
-
-
78650393263
-
Business process-based information security risk assessment
-
Australia. IEEE Computer Society
-
K. Khanmohammadi and S. H. Houmb, "Business Process-Based Information Security Risk Assessment," in NSS-4, Australia. IEEE Computer Society, 2010, pp. 199-206.
-
(2010)
NSS-4
, pp. 199-206
-
-
Khanmohammadi, K.1
Houmb, S.H.2
-
28
-
-
0028514027
-
A Taxonomy of computer program security flaws
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A Taxonomy of Computer Program Security Flaws," ACM Comput. Surv., vol. 26, no. 3, pp. 211-254, 1994.
-
(1994)
ACM Comput. Surv.
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
30
-
-
0346639662
-
A conceptual framework for understanding business processes and business process modelling
-
N. Melao and M. Pidd, "A conceptual framework for understanding business processes and business process modelling," Information Systems Journal, vol. 10, no. 2, pp. 105-129, 2000.
-
(2000)
Information Systems Journal
, vol.10
, Issue.2
, pp. 105-129
-
-
Melao, N.1
Pidd, M.2
-
31
-
-
84884143682
-
-
OMG, Meta Object Facility (MOF) Core Specification Version 2.0, 2006
-
OMG, Meta Object Facility (MOF) Core Specification Version 2.0, 2006.
-
-
-
-
33
-
-
79952955347
-
Towards adaptability and control for knowledge-intensive business processes: Declarative configurable process specifications
-
I. Rychkova and S. Nurcan, "Towards Adaptability and Control for Knowledge-Intensive Business Processes: Declarative Configurable Process Specifications," in System Sciences (HICSS), 2011 44th Hawaii International Conference on, 2011, pp. 1-10.
-
(2011)
System Sciences (HICSS), 2011 44th Hawaii International Conference on
, pp. 1-10
-
-
Rychkova, I.1
Nurcan, S.2
-
36
-
-
0000091416
-
Extending and formalizing the framework for information systems architecture
-
J. F. Sowa and J. A. Zachman, "Extending and formalizing the framework for information systems architecture," IBM Syst. J., vol. 31, no. 3, pp. 590-616, 1992.
-
(1992)
IBM Syst. J.
, vol.31
, Issue.3
, pp. 590-616
-
-
Sowa, J.F.1
Zachman, J.A.2
-
37
-
-
33749341015
-
Business models and their description
-
R. Oldenbourg Verlag GmbH
-
G. Starke, "Business Models and their Description," in Proceedings of the 9th Austrian-informatics conference on Workflow management: Challenges, Paradigms and Products, ser. CON '94. R. Oldenbourg Verlag GmbH, 1994, pp. 134-147.
-
(1994)
Proceedings of the 9th Austrian-informatics Conference on Workflow Management: Challenges, Paradigms and Products, Ser. Con '94
, pp. 134-147
-
-
Starke, G.1
-
38
-
-
33750490069
-
-
Upper Saddle River, NJ: Prentice Hall PTR
-
C. Steel, R. Nagappan, and R. Lai, Core security patterns : best practices and strategies for J2EE, Web services, and identity management. Upper Saddle River, NJ: Prentice Hall PTR, 2006.
-
(2006)
Core Security Patterns : Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
40
-
-
80055041481
-
A Model-driven engineering approach with diagnosis of non-conformance of security objectives in business process models
-
may
-
A. Varela-Vaca, R. Gasca, and A. Jimenez-Ramirez, "A Model-Driven Engineering Approach with Diagnosis of Non-Conformance of Security Objectives in Business Process Models," in Proc. of RCIS 2011, may 2011, pp. 1-6.
-
(2011)
Proc. of RCIS 2011
, pp. 1-6
-
-
Varela-Vaca, A.1
Gasca, R.2
Jimenez-Ramirez, A.3
-
41
-
-
85008035398
-
Business process analysis and optimization: Beyond reengineering
-
K. Vergidis, A. Tiwari, and B. Majeed, "Business Process Analysis and Optimization: Beyond Reengineering," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 38, no. 1, pp. 69-82, 2008.
-
(2008)
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
, vol.38
, Issue.1
, pp. 69-82
-
-
Vergidis, K.1
Tiwari, A.2
Majeed, B.3
-
43
-
-
0001134191
-
A framework for information systems architecture
-
J. A. Zachman, "A framework for information systems architecture," IBM Syst. J., vol. 26, no. 3, pp. 276-292, 1987.
-
(1987)
IBM Syst. J.
, vol.26
, Issue.3
, pp. 276-292
-
-
Zachman, J.A.1
-
44
-
-
84869116782
-
Integrating risks in business process models
-
Sydney, Australia
-
M. zur Muehlen and M. Rosemann, "Integrating Risks in Business Process Models," in Proceedings of the 2005 Australasian Conference on Information Systems (ACIS 2005), Sydney, Australia, 2005, pp. 62-72.
-
(2005)
Proceedings of the 2005 Australasian Conference on Information Systems (ACIS 2005)
, pp. 62-72
-
-
Zur Muehlen, M.1
Rosemann, M.2
|