-
7
-
-
64249086031
-
Security analysis of electronic business processes
-
S. Röhrig, and K. Knorr Security analysis of electronic business processes Electron. Commer. Res. 4 1-2 2004 59 81
-
(2004)
Electron. Commer. Res.
, vol.4
, Issue.12
, pp. 59-81
-
-
Röhrig, S.1
Knorr, K.2
-
8
-
-
33749367621
-
Security requirement analysis of business processes
-
P. Herrmann, and G. Herrmann Security requirement analysis of business processes Electron. Commer. Res. 6 3-4 2006 305 335
-
(2006)
Electron. Commer. Res.
, vol.6
, Issue.34
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
9
-
-
38149121542
-
Mal-activity diagrams for capturing attacks on business processes
-
Springer
-
G. Sindre Mal-activity diagrams for capturing attacks on business processes Proc. of REFSQ 2007 vol. 4542 2007 Springer 355 366
-
(2007)
Proc. of REFSQ 2007
, vol.4542
, pp. 355-366
-
-
Sindre, G.1
-
10
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
A. Rodríguez, E. Fernández-Medina, and M. Piattini A BPMN extension for the modeling of security requirements in business processes IEICE Trans. Inf. Syst. 90-D 4 2007 745 752
-
(2007)
IEICE Trans. Inf. Syst.
, vol.90 D
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
11
-
-
79955884819
-
Secure business process model specification through a UML 2.0 activity diagram profile
-
A. Rodríguez, E. Fernández-Medina, J. Trujillo, and M. Piattini Secure business process model specification through a UML 2.0 activity diagram profile Decis. Support. Syst. 51 3 2011 446 465
-
(2011)
Decis. Support. Syst.
, vol.51
, Issue.3
, pp. 446-465
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Trujillo, J.3
Piattini, M.4
-
13
-
-
84865695950
-
Security requirements engineering for business processes
-
Riga Technical University Riga, Latvia
-
E. Paja, P. Giorgini, S. Paul, and P.H. Meland Security requirements engineering for business processes Perspectives in Business Informatics Research 2011 Riga Technical University Riga, Latvia 163 170
-
(2011)
Perspectives in Business Informatics Research
, pp. 163-170
-
-
Paja, E.1
Giorgini, P.2
Paul, S.3
Meland, P.H.4
-
15
-
-
84892326872
-
A systematic approach to define the domain of information system security risk management
-
Springer
-
E. Dubois, P. Heymans, N. Mayer, and R. Matulevičius A systematic approach to define the domain of information system security risk management Intentional Perspectives on IS Eng 2010 Springer 289 306
-
(2010)
Intentional Perspectives on IS Eng
, pp. 289-306
-
-
Dubois, E.1
Heymans, P.2
Mayer, N.3
Matulevičius, R.4
-
17
-
-
84865685837
-
A template of security risk patterns for business processes
-
Riga Technical University Riga, Latvia
-
N. Ahmed, and R. Matulevičius A template of security risk patterns for business processes Perspectives in Business Informatics Research 2011 Riga Technical University Riga, Latvia 123 130
-
(2011)
Perspectives in Business Informatics Research
, pp. 123-130
-
-
Ahmed, N.1
Matulevičius, R.2
-
18
-
-
84862645179
-
Syntactic and semantic extensions to secure Tropos to support security risk management
-
R. Matulevičius, H. Mouratidis, N. Mayer, E. Dubois, and P. Heymans Syntactic and semantic extensions to secure Tropos to support security risk management J. UCS 18 6 2012 816 844
-
(2012)
J. UCS
, vol.18
, Issue.6
, pp. 816-844
-
-
Matulevičius, R.1
Mouratidis, H.2
Mayer, N.3
Dubois, E.4
Heymans, P.5
-
19
-
-
84858311224
-
Aligning mal-activity diagrams and security risk management for security requirements definitions
-
Springer Berlin/Heidelberg
-
M. Chowdhury, R. Matulevičius, G. Sindre, and P. Karpati Aligning mal-activity diagrams and security risk management for security requirements definitions Proc. of REFSQ 2012 2012 Springer Berlin/Heidelberg 132 139
-
(2012)
Proc. of REFSQ 2012
, pp. 132-139
-
-
Chowdhury, M.1
Matulevičius, R.2
Sindre, G.3
Karpati, P.4
-
21
-
-
33947368645
-
Model-based security analysis in seven steps - A guided tour to the CORAS method
-
F. Braber, I. Hogganvik, M.S. Lund, K. Stølen, and F. Vraalsen Model-based security analysis in seven steps - a guided tour to the CORAS method BT Technol. J. 25 2007 101 117
-
(2007)
BT Technol. J.
, vol.25
, pp. 101-117
-
-
Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stølen, K.4
Vraalsen, F.5
-
22
-
-
84873105606
-
RiskREP: Risk-based security requirements elicitation and prioritization
-
Riga Technical University Riga, Latvia
-
A. Herrmann, A. Morali, S. Etalle, and R.J. Wieringa RiskREP: risk-based security requirements elicitation and prioritization Perspectives in Business Informatics Research 2011 Riga Technical University Riga, Latvia 155 162
-
(2011)
Perspectives in Business Informatics Research
, pp. 155-162
-
-
Herrmann, A.1
Morali, A.2
Etalle, S.3
Wieringa, R.J.4
-
25
-
-
65449187948
-
Agent mediated provision of insurance services: Two case studies: Fraud and repairs
-
ACM New York, NY, USA
-
C. van Aart, and V. Tamma Agent mediated provision of insurance services: two case studies: fraud and repairs Proceedings of the 10th International Conference on Electronic Commerce, ICEC'08 2008 ACM New York, NY, USA 20:1 20:8
-
(2008)
Proceedings of the 10th International Conference on Electronic Commerce, ICEC'08
, pp. 201-208
-
-
Van Aart, C.1
Tamma, V.2
-
26
-
-
30344442772
-
Seven pernicious kingdoms: A taxonomy of software security errors
-
K. Tsipenyuk, B. Chess, and G. McGraw Seven pernicious kingdoms: a taxonomy of software security errors IEEE Secur. Priv. 3 6 2005 81 84
-
(2005)
IEEE Secur. Priv.
, vol.3
, Issue.6
, pp. 81-84
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
-
29
-
-
56649106031
-
-
National Institute of Standards and Technology (NIST)
-
M. Scholl, K. Stine, J. Hash, P. Bowen, C.D.S. Arnold Johnson, and D.I. Steinberg An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, Nist Special Publication 800-66 Revision 1 2008 National Institute of Standards and Technology (NIST)
-
(2008)
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, Nist Special Publication 800-66 Revision 1
-
-
Scholl, M.1
Stine, K.2
Hash, J.3
Bowen, P.4
Arnold Johnson, C.D.S.5
Steinberg, D.I.6
-
30
-
-
77953704942
-
A survey on detection techniques to tpprevent cross-site scripting attacks on current web applications
-
Springer Berlin/Heidelberg
-
J. Garcia-Alfaro, and G. Navarro-Arribas A survey on detection techniques to tpprevent cross-site scripting attacks on current web applications Critical Information Infrastructures Security 2008 Springer Berlin/Heidelberg 287 298
-
(2008)
Critical Information Infrastructures Security
, pp. 287-298
-
-
Garcia-Alfaro, J.1
Navarro-Arribas, G.2
-
33
-
-
77955689268
-
Protection against denial of service attacks
-
G. Loukas, and G. Öke Protection against denial of service attacks Comput. J. 53 7 2010 1020 1037
-
(2010)
Comput. J.
, vol.53
, Issue.7
, pp. 1020-1037
-
-
Loukas, G.1
Öke, G.2
-
34
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
R. Chang Defending against flooding-based distributed denial-of-service attacks: a tutorial Commun. Mag. IEEE 40 10 2002 42 51
-
(2002)
Commun. Mag. IEEE
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.1
-
36
-
-
35048886560
-
Detecting distributed denial of service (DDoS) attacks through inductive learning
-
Springer Berlin Heidelberg
-
S. Noh, C. Lee, K. Choi, and G. Jung Detecting distributed denial of service (DDoS) attacks through inductive learning Intelligent Data Engineering and Automated Learning vol. 2690 2003 Springer Berlin Heidelberg 286 295
-
(2003)
Intelligent Data Engineering and Automated Learning
, vol.2690
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
37
-
-
35648969617
-
A denial of service detector based on maximum likelihood detection and the random neural network
-
G. Öke, and G. Loukas A denial of service detector based on maximum likelihood detection and the random neural network Comput. J. 50 6 2007 717 727
-
(2007)
Comput. J.
, vol.50
, Issue.6
, pp. 717-727
-
-
Öke, G.1
Loukas, G.2
-
38
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
S.S. Kim, and A.L.N. Reddy Statistical techniques for detecting traffic anomalies through packet header data IEEE/ACM Trans. Networking 3 2008 562 575
-
(2008)
IEEE/ACM Trans. Networking
, vol.3
, pp. 562-575
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
39
-
-
34250620174
-
NetBouncer: Client-legitimacy-based high-performance DDoS filtering
-
R. Thomas, B. Mark, T. Johnson, and J. Croall NetBouncer: client-legitimacy-based high-performance DDoS filtering DARPA Information Survivability Conference and Exposition, 2003. Proceedings vol. 1 2003 14 25
-
(2003)
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
, vol.1
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
40
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker Controlling high bandwidth aggregates in the network SIGCOMM Comput. Commun. Rev. 32 3 2002 62 73
-
(2002)
SIGCOMM Comput. Commun. Rev.
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
41
-
-
79960260072
-
Multilevel security
-
Third ed. Wiley
-
R.E. Smith Multilevel security Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management Third ed. 2006 Wiley 972 986
-
(2006)
Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management
, pp. 972-986
-
-
Smith, R.E.1
-
43
-
-
0031611451
-
Role based access control on MLS systems without kernel changes
-
D.R. Kuhn Role based access control on MLS systems without kernel changes ACM Workshop on Role-Based Access, Control 1998 25 32
-
(1998)
ACM Workshop on Role-Based Access, Control
, pp. 25-32
-
-
Kuhn, D.R.1
-
44
-
-
84888104653
-
Cryptographic privacy protection techniques
-
Third ed. Wiley
-
M. Jakobsson Cryptographic privacy protection techniques Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management Third ed. 2006 Wiley 300 310
-
(2006)
Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management
, pp. 300-310
-
-
Jakobsson, M.1
-
49
-
-
77955072995
-
Incorporating risk into business process models
-
E. S. Cope, J. M. Küster, D. Etzweiler, L. A. Deleris, B. Ray, Incorporating risk into business process models, IBM J. Res. Dev. 54 (3).
-
IBM J. Res. Dev
, vol.54
, Issue.3
-
-
Cope, E.S.1
-
50
-
-
80055041481
-
A model-driven engineering approach with diagnosis of non-conformance of security objectives in business process models
-
A. Varela-Vaca, R. Gasca, and A. Jimenez-Ramirez A model-driven engineering approach with diagnosis of non-conformance of security objectives in business process models Proc. of RCIS 2011 2011 1 6
-
(2011)
Proc. of RCIS 2011
, pp. 1-6
-
-
Varela-Vaca, A.1
Gasca, R.2
Jimenez-Ramirez, A.3
-
51
-
-
78650393263
-
Business process-based information security risk assessment
-
IEEE Computer Society Australia
-
K. Khanmohammadi, and S.H. Houmb Business process-based information security risk assessment NSS-4 2010 IEEE Computer Society Australia 199 206
-
(2010)
NSS-4
, pp. 199-206
-
-
Khanmohammadi, K.1
Houmb, S.H.2
-
52
-
-
77949592990
-
A roadmap to risk-aware business process management
-
S. Jakoubi, T. Neubauer, and S. Tjoa A roadmap to risk-aware business process management IEEE APSCC-4, Singapore, Proc., IEEE 2009 23 27
-
(2009)
IEEE APSCC-4, Singapore, Proc., IEEE
, pp. 23-27
-
-
Jakoubi, S.1
Neubauer, T.2
Tjoa, S.3
|