-
1
-
-
70449472021
-
-
Apache Software Foundation (ASF)
-
Apache Software Foundation (ASF): Apache Axis2. http://axis. apache. org/axis2/java/core/ (2012).
-
(2012)
Apache Axis2
-
-
-
2
-
-
84881385420
-
-
Apache Software Foundation (ASF)
-
Apache Software Foundation (ASF): Apache ODE. http://ode. apache. org (2012).
-
(2012)
Apache ODE
-
-
-
3
-
-
84899944678
-
-
Apache Software Foundation (ASF)
-
Apache Software Foundation (ASF): Apache Rampart-Axis2 Security Module. http://axis. apache. org/axis2/java/rampart/ (2012).
-
(2012)
Apache Rampart-Axis2 Security Module
-
-
-
4
-
-
84899960334
-
AMFIBIA: A meta-model for the integration of business process modelling aspects
-
In: Leymann, F., Reisig, W., Thatte, S., van der Aalst, W. (eds.)
-
Axenath, B., Kindler, E., Rubin, V.: AMFIBIA: a meta-model for the integration of business process modelling aspects. In: Leymann, F., Reisig, W., Thatte, S., van der Aalst, W. (eds.) The Role of Business Processes in Service Oriented Architectures, Dagstuhl Seminar Proceedings (2006).
-
(2006)
The Role of Business Processes In Service Oriented Architectures, Dagstuhl Seminar Proceedings
-
-
Axenath, B.1
Kindler, E.2
Rubin, V.3
-
5
-
-
33745471209
-
Model driven security: from UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Transact. Softw. Eng. Methodol. (TOSEM) 15(1), 39-91 (2006).
-
(2006)
ACM Transact. Softw. Eng. Methodol. (TOSEM)
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
6
-
-
84856573172
-
Conformance checking of RBAC policies in process-aware information systems
-
Springer, Berlin
-
Baumgrass, A., Baier, T., Mendling, J., Strembeck, M.: Conformance checking of RBAC policies in process-aware information systems. In: Proceedings of the Workshop on Workflow Security Audit and Certification (WfSAC), Lecture Notes in Business Information Processing (LNBIP), vol. 100. Springer, Berlin (2011).
-
(2011)
Proceedings of the Workshop On Workflow Security Audit and Certification (WfSAC), Lecture Notes In Business Information Processing (LNBIP), Vol
, pp. 100
-
-
Baumgrass, A.1
Baier, T.2
Mendling, J.3
Strembeck, M.4
-
7
-
-
57849114441
-
Compliance deconstructed
-
Cannon, J., Byers, M.: Compliance deconstructed. ACM Queue 4(7), 30-37 (2006).
-
(2006)
ACM Queue
, vol.4
, Issue.7
, pp. 30-37
-
-
Cannon, J.1
Byers, M.2
-
8
-
-
79960266007
-
-
Committee on National Security Systems (CNSS)
-
Committee on National Security Systems (CNSS): National Information Assurance (IA): glossary. http://www. cnss. gov/Assets/pdf/cnssi_4009. pdf (2010).
-
(2010)
National Information Assurance (IA): Glossary
-
-
-
9
-
-
79952440320
-
How does SOX change IT?
-
Damianides, M.: How does SOX change IT? J. Corp. Account. Finance 15(6), 35-41 (2004).
-
(2004)
J. Corp. Account. Finance
, vol.15
, Issue.6
, pp. 35-41
-
-
Damianides, M.1
-
10
-
-
84899911477
-
-
Eclipse Foundation
-
Eclipse Foundation: Eclipse IDE. http://www. eclipse. org (2012).
-
(2012)
Eclipse IDE
-
-
-
12
-
-
84899950881
-
-
Eclipse Foundation
-
Eclipse Foundation: Eclipse Papyrus. http://www. eclipse. org/modeling/mdt/papyrus/ (2012).
-
(2012)
Eclipse Papyrus
-
-
-
13
-
-
80052557724
-
Specifying services using the service oriented architecture modeling language (SoaML)-a baseline for specification of cloud-based services
-
SciTePress
-
Elvesæter, B., Berre, A.-J., Sadovykh, A.: Specifying services using the service oriented architecture modeling language (SoaML)-a baseline for specification of cloud-based services. In: Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER'11), pp. 276-285. SciTePress (2011).
-
(2011)
Proceedings of the 1st International Conference On Cloud Computing and Services Science (CLOSER'11)
, pp. 276-285
-
-
Elvesæter, B.1
Berre, A.-J.2
Sadovykh, A.3
-
14
-
-
80052585719
-
Model-driven service engineering with SoaML
-
Springer, Berlin
-
Elvesæter, B., Carrez, C., Mohagheghi, P., Berre, A.-J., Johnsen, S., Solberg, A.: Model-driven service engineering with SoaML. In: Service Engineering-European Research Results, pp. 25-54. Springer, Berlin (2011).
-
(2011)
Service Engineering-European Research Results
, pp. 25-54
-
-
Elvesæter, B.1
Carrez, C.2
Mohagheghi, P.3
Berre, A.-J.4
Johnsen, S.5
Solberg, A.6
-
15
-
-
29244463832
-
An MDA approach to access control specifications using MOF and UML profiles
-
Fink, T., Koch, M., Pauls, K.: An MDA approach to access control specifications using MOF and UML profiles. In: Electronic Notes in Theoretical Computer Science, pp. 161-179 (2006).
-
(2006)
Electronic Notes In Theoretical Computer Science
, pp. 161-179
-
-
Fink, T.1
Koch, M.2
Pauls, K.3
-
16
-
-
28044457328
-
-
International Organization for Standardization (ISO), ISO/IEC 27002: 2005, Stage: 90. 92
-
International Organization for Standardization (ISO): Information technology: security techniques-code of practice for information security management, ISO/IEC 27002: 2005, Stage: 90. 92. http://www. iso. org/iso/iso_catalogue/catalogue_tc/catalogue_detail. htm?csnumber=50297 (2008).
-
(2008)
Information Technology: Security Techniques-code of Practice For Information Security Management
-
-
-
17
-
-
33644658584
-
-
International Organization for Standardization (ISO), ISO/IEC 27001: 2005, Stage: 90. 92
-
International Organization for Standardization (ISO): Information technology: security techniques-information security management systems-requirements, ISO/IEC 27001: 2005, Stage: 90. 92. http://www. iso. org/iso/iso_catalogue/catalogue_tc/catalogue_detail. htm?csnumber=42103 (2008).
-
(2008)
Information Technology: Security Techniques-information Security Management Systems-requirements
-
-
-
19
-
-
80455174429
-
UML extensions for service-oriented systems
-
In: Wirsing, M., Hölzl, M. (eds.), Springer, Berlin
-
Foster, H., Gönczy, L., Koch, N., Mayer, P., Montangero, C., Varró, D. UML extensions for service-oriented systems. In: Wirsing, M., Hölzl, M. (eds.) Rigorous Software Engineering for Service-Oriented Systems, Lecture Notes in Computer Science (LNCS), pp. 35-60. Springer, Berlin (2011).
-
(2011)
Rigorous Software Engineering For Service-Oriented Systems, Lecture Notes In Computer Science (LNCS)
, pp. 35-60
-
-
Foster, H.1
Gönczy, L.2
Koch, N.3
Mayer, P.4
Montangero, C.5
Varró, D.6
-
20
-
-
79959767827
-
Non-functional properties in the model-driven development of service-oriented systems
-
Gilmore, S., Gönczy, L., Koch, N., Mayer, P., Tribastone, M., Varró, D.: Non-functional properties in the model-driven development of service-oriented systems. Softw. Syst. Model. 10(3), 287-311 (2011).
-
(2011)
Softw. Syst. Model.
, vol.10
, Issue.3
, pp. 287-311
-
-
Gilmore, S.1
Gönczy, L.2
Koch, N.3
Mayer, P.4
Tribastone, M.5
Varró, D.6
-
21
-
-
33750315310
-
Towards a MOF/QVT-based domain architecture for model driven security
-
Springer, Berlin
-
Hafner, M., Alam, M., Breu, R.: Towards a MOF/QVT-based domain architecture for model driven security. In: Proceedings of the 9th International Conference on Model Driven Engineering Languages and Systems (MODELS 2006), Lecture Notes in Computer Science (LNCS), pp. 275-290. Springer, Berlin (2006).
-
(2006)
Proceedings of the 9th International Conference On Model Driven Engineering Languages and Systems (MODELS 2006), Lecture Notes In Computer Science (LNCS)
, pp. 275-290
-
-
Hafner, M.1
Alam, M.2
Breu, R.3
-
23
-
-
33750453781
-
SECTET: an extensible framework for the realization of secure inter-organizational workflows
-
Hafner, M., Breu, R., Agreiter, B., Nowak, A.: SECTET: an extensible framework for the realization of secure inter-organizational workflows. Internet Res. 16(5), 491-506 (2006).
-
(2006)
Internet Res.
, vol.16
, Issue.5
, pp. 491-506
-
-
Hafner, M.1
Breu, R.2
Agreiter, B.3
Nowak, A.4
-
24
-
-
47749117634
-
Modeling and enforcing advanced access control policies in healthcare systems with SECTET
-
In: Giese, H. (ed.), Springer, Berlin
-
Hafner, M., Memon, M., Alam, M.: Modeling and enforcing advanced access control policies in healthcare systems with SECTET. In: Giese, H. (ed.) Models in Software Engineering, pp. 132-144. Springer, Berlin (2008).
-
(2008)
Models In Software Engineering
, pp. 132-144
-
-
Hafner, M.1
Memon, M.2
Alam, M.3
-
25
-
-
76749126312
-
A pattern language for process execution and integration design in service-oriented architectures
-
In: Noble, J., Johnson, R. (eds.), Springer, Berlin
-
Hentrich, C., Zdun, U.: A pattern language for process execution and integration design in service-oriented architectures. In: Noble, J., Johnson, R. (eds.) Transactions on Pattern Languages of Programming I, Lecture Notes in Computer Science (LNCS), pp. 136-191. Springer, Berlin (2009).
-
(2009)
Transactions On Pattern Languages of Programming I, Lecture Notes In Computer Science (LNCS)
, pp. 136-191
-
-
Hentrich, C.1
Zdun, U.2
-
27
-
-
79960277885
-
Modeling support for confidentiality and integrity of object flows in activity models
-
Springer, Berlin
-
Hoisl, B., Strembeck, M.: Modeling support for confidentiality and integrity of object flows in activity models. In: Proceedings of the 14th International Conference on Business Information Systems (BIS2011), Lecture Notes in Business Information Processing (LNBIP), pp. 278-289. Springer, Berlin (2011).
-
(2011)
Proceedings of the 14th International Conference On Business Information Systems (BIS2011), Lecture Notes In Business Information Processing (LNBIP)
, pp. 278-289
-
-
Hoisl, B.1
Strembeck, M.2
-
29
-
-
14844363625
-
Service-oriented computing: key concepts and principles
-
Huhns, M., Singh, M.: Service-oriented computing: key concepts and principles. IEEE Internet Comput. 9, 75-81 (2005).
-
(2005)
IEEE Internet Comput.
, vol.9
, pp. 75-81
-
-
Huhns, M.1
Singh, M.2
-
30
-
-
79960160217
-
An integrated approach for identity and access management in a SOA context
-
Hummer, W., Gaubatz, P., Strembeck, M., Zdun, U., Dustdar, S.: An integrated approach for identity and access management in a SOA context. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT) (2011).
-
(2011)
Proceedings of the 16th ACM Symposium On Access Control Models and Technologies (SACMAT)
-
-
Hummer, W.1
Gaubatz, P.2
Strembeck, M.3
Zdun, U.4
Dustdar, S.5
-
34
-
-
26444476433
-
An MDA approach towards integrating formal and informal modeling languages
-
Springer, Berlin
-
Kim, S., Burger, D., Carrington, D.: An MDA approach towards integrating formal and informal modeling languages. In: Proceedings of the International Symposium of Formal Methods Europe, Lecture Notes in Computer Science (LNCS), vol. 3582, pp. 448-464. Springer, Berlin (2005).
-
(2005)
Proceedings of the International Symposium of Formal Methods Europe, Lecture Notes In Computer Science (LNCS)
, vol.3582
, pp. 448-464
-
-
Kim, S.1
Burger, D.2
Carrington, D.3
-
35
-
-
74549140366
-
The difference between graph-based and block-structured business process modelling languages
-
Kopp, O., Martin, D., Wutke, D., Leymann, F.: The difference between graph-based and block-structured business process modelling languages. Enterp. Model. Inf. Syst. 4(1), 3-13 (2009).
-
(2009)
Enterp. Model. Inf. Syst.
, vol.4
, Issue.1
, pp. 3-13
-
-
Kopp, O.1
Martin, D.2
Wutke, D.3
Leymann, F.4
-
38
-
-
77954988989
-
-
Mayer, P., Koch, N., Schröder, A., Knapp, A.: The UML4SOA profile. http://www. uml4soa. eu/wp-content/uploads/uml4soa. pdf (2010).
-
(2010)
The UML4SOA Profile
-
-
Mayer, P.1
Koch, N.2
Schröder, A.3
Knapp, A.4
-
39
-
-
56649123486
-
MDD4SOA: Model-driven service orchestration
-
IEEE
-
Mayer, P., Schröder, A., Koch, N.: MDD4SOA: model-driven service orchestration. In: Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, pp. 203-212. IEEE (2008).
-
(2008)
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference
, pp. 203-212
-
-
Mayer, P.1
Schröder, A.2
Koch, N.3
-
41
-
-
55549147543
-
On the transformation of control flow between block-oriented and graph-oriented process modeling languages
-
Mendling, J., Lassen, K., Zdun, U.: On the transformation of control flow between block-oriented and graph-oriented process modeling languages. Int. J. Business Process Integr. Manag. 3(2), 96-108 (2008).
-
(2008)
Int. J. Business Process Integr. Manag.
, vol.3
, Issue.2
, pp. 96-108
-
-
Mendling, J.1
Lassen, K.2
Zdun, U.3
-
43
-
-
67249096218
-
A framework for integrating Sarbanes-Oxley compliance into the systems development process
-
Mishra, S., Weistroffer, H.: A framework for integrating Sarbanes-Oxley compliance into the systems development process. Commun. Assoc. Inf. Systems (CAIS) 20(1), 712-727 (2007).
-
(2007)
Commun. Assoc. Inf. Systems (CAIS)
, vol.20
, Issue.1
, pp. 712-727
-
-
Mishra, S.1
Weistroffer, H.2
-
45
-
-
0038562418
-
-
National Institute of Standards and Technology (NIST), Special Publication 800-12
-
National Institute of Standards and Technology (NIST): An Introduction to Computer Security: The NIST Handbook. Special Publication 800-12. http://csrc. nist. gov/publications/nistpubs/800-12/handbook. pdf (1995).
-
(1995)
An Introduction to Computer Security: The NIST Handbook
-
-
-
46
-
-
0003508570
-
-
National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 46-3
-
National Institute of Standards and Technology (NIST): Data Encryption Standard (DES). Federal Information Processing Standards Publication 46-3. http://csrc. nist. gov/publications/fips/fips46-3/fips46-3. pdf (1999).
-
(1999)
Data Encryption Standard (DES)
-
-
-
47
-
-
0003508558
-
-
National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 197
-
National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. http://csrc. nist. gov/publications/fips/fips197/fips-197. pdf (2001).
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
48
-
-
77954619771
-
-
National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 180-3
-
National Institute of Standards and Technology (NIST): Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-3. http://csrc. nist. gov/publications/fips/fips180-3/fips180-3_final. pdf (2008).
-
(2008)
Secure Hash Standard (SHS)
-
-
-
49
-
-
24944551836
-
-
National Institute of Standards and Technology (NIST), NIST Special Publication 800-53, Revision 3
-
National Institute of Standards and Technology (NIST): Recommended Security Controls for Federal Information Systems and Organizations. NIST Special Publication 800-53, Revision 3. http://csrc. nist. gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010. pdf (2009).
-
(2009)
Recommended Security Controls For Federal Information Systems and Organizations
-
-
-
50
-
-
35248812243
-
-
National Security Agency (NSA)
-
National Security Agency (NSA): Information assurance technical framework. http://handle. dtic. mil/100. 2/ADA393328 (2000).
-
(2000)
Information Assurance Technical Framework
-
-
-
51
-
-
84899914641
-
-
No Magic, Inc
-
No Magic, Inc.: MacigDraw. https://www. magicdraw. com (2012).
-
(2012)
MacigDraw
-
-
-
52
-
-
80053311229
-
-
Object Management Group, Specification, Version 2. 0, formal/2011-01-03
-
Object Management Group: OMG Business Process Model and Notation (BPMN) Specification, Version 2. 0, formal/2011-01-03. http://www. omg. org/spec/BPMN (2011).
-
(2011)
OMG Business Process Model and Notation (BPMN)
-
-
-
61
-
-
35248828620
-
-
Organization for the Advancement of Structured Information Standards (OASIS)
-
Organization for the Advancement of Structured Information Standards (OASIS): Web Services Business Process Execution Language, Version 2. 0. http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel-v2. 0-OS. pdf (2007).
-
(2007)
Web Services Business Process Execution Language, Version 2. 0
-
-
-
62
-
-
77955933772
-
-
Organization for the Advancement of Structured Information Standards (OASIS)
-
Organization for the Advancement of Structured Information Standards (OASIS): Reference Architecture Foundation for Service Oriented Architecture, Version 1. 0. http://docs. oasis-open. org/soa-rm/soa-ra/v1. 0/soa-ra-cd-02. pdf (2009).
-
(2009)
Reference Architecture Foundation For Service Oriented Architecture, Version 1. 0
-
-
-
63
-
-
56349149885
-
-
Organization for the Advancement of Structured Information Standards (OASIS)
-
Organization for the Advancement of Structured Information Standards (OASIS): WS-SecurityPolicy 1. 3. http://docs. oasis-open. org/ws-sx/ws-securitypolicy/v1. 3/os/ws-securitypolicy-1. 3-spec-os. pdf (2009).
-
(2009)
WS-SecurityPolicy 1. 3
-
-
-
64
-
-
36749060136
-
Service-oriented computing: state of the art and research challenges
-
Papazoglou, M., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: state of the art and research challenges. IEEE Comput. 40, 38-45 (2007).
-
(2007)
IEEE Comput.
, vol.40
, pp. 38-45
-
-
Papazoglou, M.1
Traverso, P.2
Dustdar, S.3
Leymann, F.4
-
65
-
-
34147146459
-
Model driven development of security aspects
-
Reznik, J., Ritter, T., Schreiner, R., Lang, U.: Model driven development of security aspects. Electron. Notes Theo. Comput. Sci. 163, 65-79 (2007).
-
(2007)
Electron. Notes Theo. Comput. Sci.
, vol.163
, pp. 65-79
-
-
Reznik, J.1
Ritter, T.2
Schreiner, R.3
Lang, U.4
-
66
-
-
79955884819
-
Secure business process model specification through a UML 2.0 activity diagram profile
-
Rodríguez, A., Fernández-Medina, E., Trujillo, J., Piattini, M.: Secure business process model specification through a UML 2. 0 activity diagram profile. Decis. Support Syst. 51(3), 446-465 (2011).
-
(2011)
Decis. Support Syst.
, vol.51
, Issue.3
, pp. 446-465
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Trujillo, J.3
Piattini, M.4
-
67
-
-
77953671395
-
Semi-formal transformation of secure business processes into analysis class and use case models: an MDA approach
-
Rodríguez, A., García-Rodríguez de Guzmán, I., Fernández-Medina, E., Piattini, M.: Semi-formal transformation of secure business processes into analysis class and use case models: an MDA approach. Inform. Softw. Technol. 52, 945-971 (2010).
-
(2010)
Inform. Softw. Technol.
, vol.52
, pp. 945-971
-
-
Rodríguez, A.1
García-Rodríguez de Guzmán, I.2
Fernández-Medina, E.3
Piattini, M.4
-
68
-
-
73149125546
-
ModelSec: a generative architecture for model-driven security
-
Sánchez, Ó., Molina, F., García-Molina, J., Toval, A.: ModelSec: a generative architecture for model-driven security. J. Univ. Comput. Sci. 15(15), 2957-2980 (2009).
-
(2009)
J. Univ. Comput. Sci.
, vol.15
, Issue.15
, pp. 2957-2980
-
-
Sánchez, Ó.1
Molina, F.2
García-Molina, J.3
Toval, A.4
-
72
-
-
79960287643
-
Modeling support for delegating roles, tasks, and duties in a process-related RBAC context
-
Springer, Berlin
-
Schefer, S., Strembeck, M.: Modeling support for delegating roles, tasks, and duties in a process-related RBAC context. In: Proceedings of the International Workshop on Information Systems Security Engineering (WISSE), Lecture Notes in Business Information Processing (LNBIP), vol. 83. Springer, Berlin (2011).
-
(2011)
Proceedings of the International Workshop On Information Systems Security Engineering (WISSE), Lecture Notes In Business Information Processing (LNBIP)
, vol.83
-
-
Schefer, S.1
Strembeck, M.2
-
73
-
-
84856575407
-
Checking satisfiability aspects of binding constraints in a business process context
-
Springer, Berlin
-
Schefer, S., Strembeck, M., Mendling, J.: Checking satisfiability aspects of binding constraints in a business process context. In: Proceedings of the Workshop on Workflow Security Audit and Certification (WfSAC), Lecture Notes in Business Information Processing (LNBIP), vol. 100. Springer, Berlin (2011).
-
(2011)
Proceedings of the Workshop On Workflow Security Audit and Certification (WfSAC), Lecture Notes In Business Information Processing (LNBIP)
, vol.100
-
-
Schefer, S.1
Strembeck, M.2
Mendling, J.3
-
74
-
-
81255207847
-
Detecting and resolving conflicts of mutual-exclusion and binding constraints in a business process context
-
Springer, Berlin
-
Schefer, S., Strembeck, M., Mendling, J., Baumgrass, A.: Detecting and resolving conflicts of mutual-exclusion and binding constraints in a business process context. In: Proceedings of the 19th International Conference on Cooperative Information Systems (CoopIS), Lecture Notes in Computer Science (LNCS), vol. 7044. Springer, Berlin (2011).
-
(2011)
Proceedings of the 19th International Conference On Cooperative Information Systems (CoopIS), Lecture Notes In Computer Science (LNCS)
, vol.7044
-
-
Schefer, S.1
Strembeck, M.2
Mendling, J.3
Baumgrass, A.4
-
77
-
-
33344465743
-
Model-driven engineering: guest editor's introduction
-
Schmidt, D.: Model-driven engineering: guest editor's introduction. IEEE Comput. 39(2), 25-31 (2006).
-
(2006)
IEEE Comput.
, vol.39
, Issue.2
, pp. 25-31
-
-
Schmidt, D.1
-
78
-
-
79960296459
-
Connecting security requirements analysis and secure design using patterns and UMLsec
-
Springer, Berlin
-
Schmidt, H., Jürjens, J.: Connecting security requirements analysis and secure design using patterns and UMLsec. In: Proceedings of the 23rd International Conference on Advanced Information Systems Engineering (CAiSE), Lecture Notes in Computer Science (LNCS), pp. 367-382. Springer, Berlin (2011).
-
(2011)
Proceedings of the 23rd International Conference On Advanced Information Systems Engineering (CAiSE), Lecture Notes In Computer Science (LNCS)
, pp. 367-382
-
-
Schmidt, H.1
Jürjens, J.2
-
79
-
-
0141725660
-
The pragmatics of model-driven development
-
Selic, B.: The pragmatics of model-driven development. IEEE Softw. 20(5), 19-25 (2003).
-
(2003)
IEEE Softw.
, vol.20
, Issue.5
, pp. 19-25
-
-
Selic, B.1
-
80
-
-
0141725642
-
Model transformation: the heart and soul of model-driven software development
-
Sendall, S., Kozaczynski, W.: Model transformation: the heart and soul of model-driven software development. IEEE Softw. 20(5), 42-45 (2003).
-
(2003)
IEEE Softw.
, vol.20
, Issue.5
, pp. 42-45
-
-
Sendall, S.1
Kozaczynski, W.2
-
81
-
-
84888210829
-
Invocation assembly lines: Patterns of invocation and message processing in object remoting middleware
-
In: Kelly, A., Weiss, M. (eds.)
-
Sobernig, S., Zdun, U.: Invocation assembly lines: patterns of invocation and message processing in object remoting middleware. In: Kelly, A., Weiss, M. (eds.) Proceedings of 14th Annual European Conference on Pattern Languages of Programming (EuroPLoP 2009), CEUR-WS. org, vol. 566. (2009).
-
(2009)
Proceedings of 14th Annual European Conference On Pattern Languages of Programming (EuroPLoP 2009), CEUR-WS. Org
, vol.566
-
-
Sobernig, S.1
Zdun, U.2
-
83
-
-
74549142762
-
-
Addison-Wesley, Boston
-
Steinberg, D., Budinsky, F., Paternostro, M., Merks, E.: EMF: Eclipse Modeling Framework. Addison-Wesley, Boston (2008).
-
(2008)
EMF: Eclipse Modeling Framework
-
-
Steinberg, D.1
Budinsky, F.2
Paternostro, M.3
Merks, E.4
-
84
-
-
78650098860
-
Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context
-
Springer, Berlin
-
Strembeck, M., Mendling, J.: Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context. In: Proceedings of the 18th International Conference on Cooperative Information Systems (CoopIS), Lecture Notes in Computer Science (LNCS), vol. 6426. Springer, Berlin (2010).
-
(2010)
Proceedings of the 18th International Conference On Cooperative Information Systems (CoopIS), Lecture Notes In Computer Science (LNCS)
, vol.6426
-
-
Strembeck, M.1
Mendling, J.2
-
85
-
-
79952439750
-
Modeling process-related RBAC models with extended UML activity models
-
Strembeck, M., Mendling, J.: Modeling process-related RBAC models with extended UML activity models. Inform. Softw. Technol. 53(5), 456-483 (2011).
-
(2011)
Inform. Softw. Technol.
, vol.53
, Issue.5
, pp. 456-483
-
-
Strembeck, M.1
Mendling, J.2
-
86
-
-
4744347868
-
Best-practice patterns and tool support for configuring secure web services messaging
-
IEEE
-
Tatsubori, M., Imamura, T., Nakamura, Y.: Best-practice patterns and tool support for configuring secure web services messaging. In: Proceedings of the IEEE International Conference on Web Services, pp. 244-251. IEEE (2004).
-
(2004)
Proceedings of the IEEE International Conference On Web Services
, pp. 244-251
-
-
Tatsubori, M.1
Imamura, T.2
Nakamura, Y.3
-
88
-
-
84899977013
-
-
Wenzel, S.: CARiSMA. http://vm4a003. itmc. tu-dortmund. de/carisma/web/doku. php (2012).
-
(2012)
CARiSMA
-
-
Wenzel, S.1
-
89
-
-
84859973861
-
Modelling security goals in business processes. In Modellierung 2008
-
Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. In Modellierung 2008, Lecture Notes in Informatics (LNI), pp. 197-212 (2008).
-
(2008)
Lecture Notes In Informatics (LNI)
, pp. 197-212
-
-
Wolter, C.1
Menzel, M.2
Meinel, C.3
-
90
-
-
63949084590
-
Model-driven business process security requirement specification
-
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Systems Archit. 55(4), 211-223 (2009).
-
(2009)
J. Systems Archit.
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
91
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
In: Alonso, G., Dadam, P., Rosemann, M. (eds.), Springer, Berlin
-
Wolter, C., Schaad, A.: Modeling of task-based authorization constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) Proceedings of the 5th International Conference on Business Process Management (BPM), volume 4714 of Lecture Notes in Computer Science (LNCS), pp. 64-79. Springer, Berlin (2007).
-
(2007)
Proceedings of the 5th International Conference On Business Process Management (BPM), Volume 4714 of Lecture Notes In Computer Science (LNCS)
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
93
-
-
38149051793
-
-
World Wide Web Consortium (W3C), Attachment
-
World Wide Web Consortium (W3C): Web Services Policy 1. 5, Attachment. http://www. w3. org/TR/ws-policy-attach/ (2007).
-
(2007)
Web Services Policy 1. 5
-
-
-
94
-
-
38149051793
-
-
World Wide Web Consortium (W3C)
-
World Wide Web Consortium (W3C): Web Services Policy 1. 5, Framework. http://www. w3. org/TR/ws-policy/ (2007).
-
(2007)
Web Services Policy 1. 5, Framework
-
-
-
95
-
-
44849101712
-
Patterns of component and language integration
-
In: Manolescu, D., Völter, M., Noble, J. (eds.)
-
Zdun, U.: Patterns of component and language integration. In: Manolescu, D., Völter, M., Noble, J. (eds.) Pattern Languages of Program Design 5 (2006).
-
(2006)
Pattern Languages of Program Design
, pp. 5
-
-
Zdun, U.1
-
96
-
-
35448958453
-
Model-driven and pattern-based integration of process-driven SOA models
-
Zdun, U., Dustdar, S.: Model-driven and pattern-based integration of process-driven SOA models. Int. J. Business Process Integr. Manag. (IJBPIM) 2(2), 109-119 (2007).
-
(2007)
Int. J. Business Process Integr. Manag. (IJBPIM)
, vol.2
, Issue.2
, pp. 109-119
-
-
Zdun, U.1
Dustdar, S.2
-
97
-
-
34848864554
-
Modeling process-driven and service-oriented architectures using patterns and pattern primitives
-
Zdun, U., Hentrich, C., Dustdar, S.: Modeling process-driven and service-oriented architectures using patterns and pattern primitives. ACM Transact. Web 1(3), 14: 1-14: 44 (2007).
-
(2007)
ACM Transact. Web
, vol.1
, Issue.3
, pp. 1-44
-
-
Zdun, U.1
Hentrich, C.2
Dustdar, S.3
|