메뉴 건너뛰기




Volumn 36, Issue 4, 2014, Pages 723-733

Securing business processes using security risk-oriented patterns

Author keywords

Business process modelling; Security engineering; Security requirements; Security risk oriented patterns

Indexed keywords


EID: 84894261595     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2013.12.007     Document Type: Article
Times cited : (52)

References (52)
  • 7
    • 64249086031 scopus 로고    scopus 로고
    • Security analysis of electronic business processes
    • S. Röhrig, and K. Knorr Security analysis of electronic business processes Electron. Commer. Res. 4 1-2 2004 59 81
    • (2004) Electron. Commer. Res. , vol.4 , Issue.12 , pp. 59-81
    • Röhrig, S.1    Knorr, K.2
  • 8
    • 33749367621 scopus 로고    scopus 로고
    • Security requirement analysis of business processes
    • P. Herrmann, and G. Herrmann Security requirement analysis of business processes Electron. Commer. Res. 6 3-4 2006 305 335
    • (2006) Electron. Commer. Res. , vol.6 , Issue.34 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2
  • 9
    • 38149121542 scopus 로고    scopus 로고
    • Mal-activity diagrams for capturing attacks on business processes
    • Springer
    • G. Sindre Mal-activity diagrams for capturing attacks on business processes Proc. of REFSQ 2007 vol. 4542 2007 Springer 355 366
    • (2007) Proc. of REFSQ 2007 , vol.4542 , pp. 355-366
    • Sindre, G.1
  • 10
    • 34247151648 scopus 로고    scopus 로고
    • A BPMN extension for the modeling of security requirements in business processes
    • A. Rodríguez, E. Fernández-Medina, and M. Piattini A BPMN extension for the modeling of security requirements in business processes IEICE Trans. Inf. Syst. 90-D 4 2007 745 752
    • (2007) IEICE Trans. Inf. Syst. , vol.90 D , Issue.4 , pp. 745-752
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 11
    • 79955884819 scopus 로고    scopus 로고
    • Secure business process model specification through a UML 2.0 activity diagram profile
    • A. Rodríguez, E. Fernández-Medina, J. Trujillo, and M. Piattini Secure business process model specification through a UML 2.0 activity diagram profile Decis. Support. Syst. 51 3 2011 446 465
    • (2011) Decis. Support. Syst. , vol.51 , Issue.3 , pp. 446-465
    • Rodríguez, A.1    Fernández-Medina, E.2    Trujillo, J.3    Piattini, M.4
  • 15
    • 84892326872 scopus 로고    scopus 로고
    • A systematic approach to define the domain of information system security risk management
    • Springer
    • E. Dubois, P. Heymans, N. Mayer, and R. Matulevičius A systematic approach to define the domain of information system security risk management Intentional Perspectives on IS Eng 2010 Springer 289 306
    • (2010) Intentional Perspectives on IS Eng , pp. 289-306
    • Dubois, E.1    Heymans, P.2    Mayer, N.3    Matulevičius, R.4
  • 17
    • 84865685837 scopus 로고    scopus 로고
    • A template of security risk patterns for business processes
    • Riga Technical University Riga, Latvia
    • N. Ahmed, and R. Matulevičius A template of security risk patterns for business processes Perspectives in Business Informatics Research 2011 Riga Technical University Riga, Latvia 123 130
    • (2011) Perspectives in Business Informatics Research , pp. 123-130
    • Ahmed, N.1    Matulevičius, R.2
  • 18
    • 84862645179 scopus 로고    scopus 로고
    • Syntactic and semantic extensions to secure Tropos to support security risk management
    • R. Matulevičius, H. Mouratidis, N. Mayer, E. Dubois, and P. Heymans Syntactic and semantic extensions to secure Tropos to support security risk management J. UCS 18 6 2012 816 844
    • (2012) J. UCS , vol.18 , Issue.6 , pp. 816-844
    • Matulevičius, R.1    Mouratidis, H.2    Mayer, N.3    Dubois, E.4    Heymans, P.5
  • 19
    • 84858311224 scopus 로고    scopus 로고
    • Aligning mal-activity diagrams and security risk management for security requirements definitions
    • Springer Berlin/Heidelberg
    • M. Chowdhury, R. Matulevičius, G. Sindre, and P. Karpati Aligning mal-activity diagrams and security risk management for security requirements definitions Proc. of REFSQ 2012 2012 Springer Berlin/Heidelberg 132 139
    • (2012) Proc. of REFSQ 2012 , pp. 132-139
    • Chowdhury, M.1    Matulevičius, R.2    Sindre, G.3    Karpati, P.4
  • 21
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps - A guided tour to the CORAS method
    • F. Braber, I. Hogganvik, M.S. Lund, K. Stølen, and F. Vraalsen Model-based security analysis in seven steps - a guided tour to the CORAS method BT Technol. J. 25 2007 101 117
    • (2007) BT Technol. J. , vol.25 , pp. 101-117
    • Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stølen, K.4    Vraalsen, F.5
  • 22
    • 84873105606 scopus 로고    scopus 로고
    • RiskREP: Risk-based security requirements elicitation and prioritization
    • Riga Technical University Riga, Latvia
    • A. Herrmann, A. Morali, S. Etalle, and R.J. Wieringa RiskREP: risk-based security requirements elicitation and prioritization Perspectives in Business Informatics Research 2011 Riga Technical University Riga, Latvia 155 162
    • (2011) Perspectives in Business Informatics Research , pp. 155-162
    • Herrmann, A.1    Morali, A.2    Etalle, S.3    Wieringa, R.J.4
  • 26
    • 30344442772 scopus 로고    scopus 로고
    • Seven pernicious kingdoms: A taxonomy of software security errors
    • K. Tsipenyuk, B. Chess, and G. McGraw Seven pernicious kingdoms: a taxonomy of software security errors IEEE Secur. Priv. 3 6 2005 81 84
    • (2005) IEEE Secur. Priv. , vol.3 , Issue.6 , pp. 81-84
    • Tsipenyuk, K.1    Chess, B.2    McGraw, G.3
  • 30
    • 77953704942 scopus 로고    scopus 로고
    • A survey on detection techniques to tpprevent cross-site scripting attacks on current web applications
    • Springer Berlin/Heidelberg
    • J. Garcia-Alfaro, and G. Navarro-Arribas A survey on detection techniques to tpprevent cross-site scripting attacks on current web applications Critical Information Infrastructures Security 2008 Springer Berlin/Heidelberg 287 298
    • (2008) Critical Information Infrastructures Security , pp. 287-298
    • Garcia-Alfaro, J.1    Navarro-Arribas, G.2
  • 33
    • 77955689268 scopus 로고    scopus 로고
    • Protection against denial of service attacks
    • G. Loukas, and G. Öke Protection against denial of service attacks Comput. J. 53 7 2010 1020 1037
    • (2010) Comput. J. , vol.53 , Issue.7 , pp. 1020-1037
    • Loukas, G.1    Öke, G.2
  • 34
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • R. Chang Defending against flooding-based distributed denial-of-service attacks: a tutorial Commun. Mag. IEEE 40 10 2002 42 51
    • (2002) Commun. Mag. IEEE , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.1
  • 35
    • 4143103999 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc. Sebastopol, CA, USA
    • K. Hemenway, and T. Calishain Spidering Hacks 2003 O'Reilly & Associates, Inc. Sebastopol, CA, USA
    • (2003) Spidering Hacks
    • Hemenway, K.1    Calishain, T.2
  • 36
    • 35048886560 scopus 로고    scopus 로고
    • Detecting distributed denial of service (DDoS) attacks through inductive learning
    • Springer Berlin Heidelberg
    • S. Noh, C. Lee, K. Choi, and G. Jung Detecting distributed denial of service (DDoS) attacks through inductive learning Intelligent Data Engineering and Automated Learning vol. 2690 2003 Springer Berlin Heidelberg 286 295
    • (2003) Intelligent Data Engineering and Automated Learning , vol.2690 , pp. 286-295
    • Noh, S.1    Lee, C.2    Choi, K.3    Jung, G.4
  • 37
    • 35648969617 scopus 로고    scopus 로고
    • A denial of service detector based on maximum likelihood detection and the random neural network
    • G. Öke, and G. Loukas A denial of service detector based on maximum likelihood detection and the random neural network Comput. J. 50 6 2007 717 727
    • (2007) Comput. J. , vol.50 , Issue.6 , pp. 717-727
    • Öke, G.1    Loukas, G.2
  • 38
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • S.S. Kim, and A.L.N. Reddy Statistical techniques for detecting traffic anomalies through packet header data IEEE/ACM Trans. Networking 3 2008 562 575
    • (2008) IEEE/ACM Trans. Networking , vol.3 , pp. 562-575
    • Kim, S.S.1    Reddy, A.L.N.2
  • 43
    • 0031611451 scopus 로고    scopus 로고
    • Role based access control on MLS systems without kernel changes
    • D.R. Kuhn Role based access control on MLS systems without kernel changes ACM Workshop on Role-Based Access, Control 1998 25 32
    • (1998) ACM Workshop on Role-Based Access, Control , pp. 25-32
    • Kuhn, D.R.1
  • 45
  • 49
    • 77955072995 scopus 로고    scopus 로고
    • Incorporating risk into business process models
    • E. S. Cope, J. M. Küster, D. Etzweiler, L. A. Deleris, B. Ray, Incorporating risk into business process models, IBM J. Res. Dev. 54 (3).
    • IBM J. Res. Dev , vol.54 , Issue.3
    • Cope, E.S.1
  • 50
    • 80055041481 scopus 로고    scopus 로고
    • A model-driven engineering approach with diagnosis of non-conformance of security objectives in business process models
    • A. Varela-Vaca, R. Gasca, and A. Jimenez-Ramirez A model-driven engineering approach with diagnosis of non-conformance of security objectives in business process models Proc. of RCIS 2011 2011 1 6
    • (2011) Proc. of RCIS 2011 , pp. 1-6
    • Varela-Vaca, A.1    Gasca, R.2    Jimenez-Ramirez, A.3
  • 51
    • 78650393263 scopus 로고    scopus 로고
    • Business process-based information security risk assessment
    • IEEE Computer Society Australia
    • K. Khanmohammadi, and S.H. Houmb Business process-based information security risk assessment NSS-4 2010 IEEE Computer Society Australia 199 206
    • (2010) NSS-4 , pp. 199-206
    • Khanmohammadi, K.1    Houmb, S.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.