-
3
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
Apr
-
A. Rodriguez, E. Fernandez-Medina, and M. Piattini, "A BPMN extension for the modeling of security requirements in business processes," IEICE TRANSACTIONS on Information and Systems, vol. E90-D, no. 4, pp. 745-752, Apr. 2007.
-
(2007)
IEICE TRANSACTIONS on Information and Systems
, vol.E90-D
, Issue.4
, pp. 745-752
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
4
-
-
84859973861
-
Modelling security goals in business processes
-
C. Wolter, M. Menzel, and C. Meinel, "Modelling security goals in business processes," in Modellierung, ser. volume 127 of LNI. Berlin, Germany, 2008. GI, 2008, p. 197-212.
-
(2008)
Modellierung, Ser. Volume 127 of LNI. Berlin, Germany, 2008. GI
, pp. 197-212
-
-
Wolter, C.1
Menzel, M.2
Meinel, C.3
-
5
-
-
38049129493
-
What makes process models understandable
-
Springer
-
J. Mendling, H. A. Reijers, and J. Cardoso, "What makes process models understandable?" in Business Process Management, ser. LNCS. Springer, 2007, no. 4714, pp. 48-63.
-
(2007)
Business Process Management, Ser. LNCS
, Issue.4714
, pp. 48-63
-
-
Mendling, J.1
Reijers, H.A.2
Cardoso, J.3
-
6
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
Springer
-
C. Wolter and A. Schaad, "Modeling of task-based authorization constraints in BPMN," in Business Process Management, ser. LNCS. Springer, 2007, vol. 4714, p. 64-79.
-
(2007)
Business Process Management, Ser. LNCS
, vol.4714
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
7
-
-
79956069069
-
-
OMG, OMG Document formal/2011-01-03, Jan.
-
OMG, "Business process model and notation (BPMN) version 2.0," OMG, OMG Document formal/2011-01-03, Jan. 2011. [Online]. Available: http://www.omg.org/spec/ BPMN/2.0
-
(2011)
Business Process Model and Notation (BPMN) Version 2.0
-
-
-
8
-
-
73449140991
-
The physics of notations: Toward a scientific basis for constructing visual notations in software engineering
-
Dec
-
D. Moody, "The physics of notations: Toward a scientific basis for constructing visual notations in software engineering," IEEE Transactions on Software Engineering, vol. 35, no. 6, pp. 756-779, Dec. 2009.
-
(2009)
IEEE Transactions on Software Engineering
, vol.35
, Issue.6
, pp. 756-779
-
-
Moody, D.1
-
9
-
-
25844517955
-
Theoretical and practical issues in evaluating the quality of conceptual models: Current state and future directions
-
Dec
-
D. L. Moody, "Theoretical and practical issues in evaluating the quality of conceptual models: current state and future directions," Data &Knowledge Engineering, vol. 55, no. 3, pp. 243-276, Dec. 2005.
-
(2005)
Data &Knowledge Engineering
, vol.55
, Issue.3
, pp. 243-276
-
-
Moody, D.L.1
-
10
-
-
84943253914
-
Cognitive dimensions of notations: Design tools for cognitive technology
-
Springer, Jan.
-
A. F. Blackwell et al., "Cognitive dimensions of notations: Design tools for cognitive technology," in Cognitive Technology: Instruments of Mind, ser. LNCS. Springer, Jan. 2001, no. 2117, pp. 325-341.
-
(2001)
Cognitive Technology: Instruments of Mind, Ser. LNCS.
, Issue.2117
, pp. 325-341
-
-
Blackwell, A.F.1
-
11
-
-
79952273712
-
Analysing the cognitive effectiveness of the BPMN 2.0 visual notation
-
Springer, Jan.
-
N. Genon, P. Heymans, and D. Amyot, "Analysing the cognitive effectiveness of the BPMN 2.0 visual notation," in Software Language Engineering, ser. LNCS. Springer, Jan. 2011, no. 6563, pp. 377-396.
-
(2011)
Software Language Engineering, Ser. LNCS
, Issue.6563
, pp. 377-396
-
-
Genon, N.1
Heymans, P.2
Amyot, D.3
-
12
-
-
84944718952
-
On the usage of labels and icons in business process modeling
-
J. Mendling, J. Recker, and H. A. Reijers, "On the usage of labels and icons in business process modeling," International Journal of Information System Modeling and Design, vol. 1, no. 2, pp. 40-58, 2010.
-
(2010)
International Journal of Information System Modeling and Design
, vol.1
, Issue.2
, pp. 40-58
-
-
Mendling, J.1
Recker, J.2
Reijers, H.A.3
-
13
-
-
84870387775
-
Supporting compliance through enhancing internal control systems by conceptual business process security modeling
-
Jan
-
M. Riesner and G. Pernul, "Supporting compliance through enhancing internal control systems by conceptual business process security modeling," in ACIS 2010 Proceedings, Jan. 2010.
-
(2010)
ACIS 2010 Proceedings
-
-
Riesner, M.1
Pernul, G.2
-
15
-
-
0003140320
-
Organizing knowledge syntheses: A taxonomy of literature reviews
-
Mar
-
H. M. Cooper, "Organizing knowledge syntheses: A taxonomy of literature reviews," Knowledge in Society, vol. 1, no. 1, pp. 104-126, Mar. 1988.
-
(1988)
Knowledge in Society
, vol.1
, Issue.1
, pp. 104-126
-
-
Cooper, H.M.1
-
16
-
-
57349111770
-
Task-based entailment constraints for basic workflow patterns
-
C. Wolter, A. Schaad, and C. Meinel, "Task-based entailment constraints for basic workflow patterns," in Proc. of the 13th ACM symposium on Access control models and technologies, ser. SACMAT '08. ACM, 2008, p. 51-60.
-
(2008)
Proc. of the 13th ACM Symposium on Access Control Models and Technologies, Ser. SACMAT '08. ACM
, pp. 51-60
-
-
Wolter, C.1
Schaad, A.2
Meinel, C.3
-
17
-
-
70349683196
-
Security requirements specifcation in service-oriented business process management
-
M. Menzel, I. Thomas, and C. Meinel, "Security requirements specifcation in service-oriented business process management," in Availability, Reliability and Security, 2009. ARES '09. Int. Conference on. IEEE, 2009, p. 41-48.
-
(2009)
Availability, Reliability and Security, 2009. ARES '09. Int. Conference On. IEEE
, pp. 41-48
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
18
-
-
84864034347
-
SecureBPMN: Modeling and enforcing access control requirements in business processes
-
A. D. Brucker, I. Hang, G. Luckemeyer, and R. Ruparrel, "SecureBPMN: modeling and enforcing access control requirements in business processes," in SACMAT'12, ser. Proc. of the 17th ACM symposium on Access Control Models and Technologies. ACM, 2012, p. 123-125.
-
(2012)
SACMAT'12, Ser. Proc. of the 17th ACM Symposium on Access Control Models and Technologies. ACM
, pp. 123-125
-
-
Brucker, A.D.1
Hang, I.2
Luckemeyer, G.3
Ruparrel, R.4
-
19
-
-
84864711339
-
Towards definition of secure business processes
-
Springer
-
O. Altuhhova, R. Matulevicius, and N. Ahmed, "Towards definition of secure business processes," in Advanced Information Systems Engineering Workshops, ser. LNBIP, vol. 112. Springer, 2012, p. 1-15.
-
(2012)
Advanced Information Systems Engineering Workshops, Ser. LNBIP
, vol.112
, pp. 1-15
-
-
Altuhhova, O.1
Matulevicius, R.2
Ahmed, N.3
-
21
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R. A. Botha and J. H. P. Eloff, "Separation of duties for access control enforcement in workflow environments," IBM Systems Journal, vol. 40, no. 3, pp. 666-682, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
22
-
-
84874423015
-
SPRINT-responsibilities: Design and development of security policies in process-aware information systems
-
M. Leitner, J. Mangler, and S. Rinderle-Ma, "SPRINT- responsibilities: Design and development of security policies in process-aware information systems," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 2, no. 4, pp. 4-26, 2011.
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
, vol.2
, Issue.4
, pp. 4-26
-
-
Leitner, M.1
Mangler, J.2
Rinderle-Ma, S.3
-
23
-
-
84858308888
-
Towards a more semantically transparent i*visual syntax
-
Springer
-
N. Genon, P. Caire, H. Toussaint, P. Heymans, and D. Moody, "Towards a more semantically transparent i*visual syntax," in Requirements Engineering: Foundation for Software Quality, ser. LNCS. Springer, 2012, no. 7195, pp. 140-146.
-
(2012)
Requirements Engineering: Foundation for Software Quality, Ser. LNCS
, Issue.7195
, pp. 140-146
-
-
Genon, N.1
Caire, P.2
Toussaint, H.3
Heymans, P.4
Moody, D.5
|