-
1
-
-
70350665919
-
-
Technical report, ISACA
-
An introduction to the business model for information security. Technical report, ISACA (2009), http://www. isaca. org/Knowledge-Center/Research/ResearchDeliverables/Pages/An-Introduction-to-the-Business-Model-for-Information-Security. aspx.
-
(2009)
An introduction to the business model for information security
-
-
-
2
-
-
84904546030
-
-
Federal Aviation Administration, (last visited March 2014)
-
Federal Aviation Administration. SWIM ATM case study, http://www. faa. gov/about/office org/headquarters offices/ato/service units/techops/atc comms services/swim/(last visited March 2014).
-
SWIM ATM case study
-
-
-
3
-
-
84874268919
-
BPMN-Q: A language to query business processes
-
In:, St. Goar, Germany. LNI, vol. P-119,. GI
-
Awad, A.: BPMN-Q: A language to query business processes. In: EMISA, St. Goar, Germany. LNI, vol. P-119, pp. 115-128. GI (2007).
-
(2007)
EMISA
, pp. 115-128
-
-
Awad, A.1
-
5
-
-
45049087141
-
Querying business processes with BP-QL
-
Beeri, C., Eyal, A., Kamenkovich, S., Milo, T.: Querying business processes with BP-QL. Information Systems 33(6), 477-507 (2008).
-
(2008)
Information Systems
, vol.33
, Issue.6
, pp. 477-507
-
-
Beeri, C.1
Eyal, A.2
Kamenkovich, S.3
Milo, T.4
-
6
-
-
84864034347
-
SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes
-
In
-
Brucker, A. D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes. In: Proc. of SACMAT 2012, pp. 123-126 (2012).
-
(2012)
Proc. of SACMAT 2012
, pp. 123-126
-
-
Brucker, A.D.1
Hang, I.2
Lückemeyer, G.3
Ruparel, R.4
-
7
-
-
84892380317
-
A reference model of information assurance and security
-
In:, (September
-
Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: Eighth International Conference on ARES, pp. 546-555 (September 2013).
-
(2013)
Eighth International Conference on ARES
, pp. 546-555
-
-
Cherdantseva, Y.1
Hilton, J.2
-
8
-
-
38449113336
-
Querying structural and behavioral properties of business processes
-
In: Arenas, M., Schwartzbach, M.I. (eds.),. Springer, Heidelberg
-
Deutch, D., Milo, T.: Querying structural and behavioral properties of business processes. In: Arenas, M., Schwartzbach, M. I. (eds.) DBPL 2007. LNCS, vol. 4797, pp. 169-185. Springer, Heidelberg (2007).
-
(2007)
DBPL 2007. LNCS
, vol.4797
, pp. 169-185
-
-
Deutch, D.1
Milo, T.2
-
10
-
-
2942753973
-
Specifying reusable security requirements
-
Firesmith, D.: Specifying reusable security requirements. JOT 3(1), 61-75 (2004).
-
(2004)
JOT
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
11
-
-
38349004887
-
Auditing business process compliance
-
In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.),. Springer, Heidelberg
-
Ghose, A., Koliadis, G.: Auditing business process compliance. In: Krämer, B. J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169-180. Springer, Heidelberg (2007).
-
(2007)
ICSOC 2007. LNCS
, vol.4749
, pp. 169-180
-
-
Ghose, A.1
Koliadis, G.2
-
12
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618-644 (2007).
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
13
-
-
79955163100
-
Umlsec: Extending uml for secure systems development
-
In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.),. Springer, Heidelberg
-
Jürjens, J.: Umlsec: Extending uml for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002).
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
14
-
-
84892405502
-
An analysis and evaluation of security aspects in the business process model and notation
-
In
-
Leitner, M., Miller, M., Rinderle-Ma, S.: An analysis and evaluation of security aspects in the business process model and notation. In: Proc. of ARES, pp. 262-267 (2013).
-
(2013)
Proc. of ARES
, pp. 262-267
-
-
Leitner, M.1
Miller, M.2
Rinderle-Ma, S.3
-
15
-
-
84892614680
-
A systematic review on security in process-aware information systems-constitution, challenges, and future directions
-
Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems-constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273-293 (2014).
-
(2014)
Inf. Softw. Technol
, vol.56
, Issue.3
, pp. 273-293
-
-
Leitner, M.1
Rinderle-Ma, S.2
-
16
-
-
85006049205
-
An experimental study on the design and modeling of security concepts in business processes
-
In
-
Leitner, M., Schefer-Wenzl, S., Rinderle-Ma, S., Strembeck, M.: An experimental study on the design and modeling of security concepts in business processes. In: Proc. of PoEM, pp. 236-250 (2013).
-
(2013)
Proc. of PoEM
, pp. 236-250
-
-
Leitner, M.1
Schefer-Wenzl, S.2
Rinderle-Ma, S.3
Strembeck, M.4
-
17
-
-
34247861351
-
A static compliance-checking framework for business process models
-
Liu, Y., Müller, S., Xu, K.: A static compliance-checking framework for business process models. IBM Syst. J. 46(2), 335-361 (2007).
-
(2007)
IBM Syst. J
, vol.46
, Issue.2
, pp. 335-361
-
-
Liu, Y.1
Müller, S.2
Xu, K.3
-
19
-
-
70349683196
-
Security requirements specification in serviceoriented business process management
-
In
-
Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in serviceoriented business process management. In: Proc of ARES 2009, pp. 41-48 (2009).
-
(2009)
Proc of ARES 2009
, pp. 41-48
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
20
-
-
84863586009
-
Security and safety of assets in business processes
-
In:,. ACM, USA
-
Monakova, G., Brucker, A. D., Schaad, A.: Security and safety of assets in business processes. In: Applied Computing, vol. 27, pp. 1667-1673. ACM, USA (2012).
-
(2012)
Applied Computing
, vol.27
, pp. 1667-1673
-
-
Monakova, G.1
Brucker, A.D.2
Schaad, A.3
-
21
-
-
73449140991
-
The physics of notations: Toward a scientific basis for constructing visual notations in software engineering
-
Moody, D.: The physics of notations: Toward a scientific basis for constructing visual notations in software engineering. IEEE Trans. Softw. Eng. 35, 756-779 (2009).
-
(2009)
IEEE Trans. Softw. Eng
, vol.35
, pp. 756-779
-
-
Moody, D.1
-
23
-
-
84904545353
-
-
(January, O
-
O.: BPMN 2. 0, http://www. omg. org/spec/BPMN/2. 0 (January 2011).
-
(2011)
BPMN 2. 0
-
-
-
24
-
-
84892416940
-
Our excessively simplistic information security model and how to fix it
-
Parker, D.: Our excessively simplistic information security model and how to fix it. ISSA Journal, 12-21 (2010).
-
(2010)
ISSA Journal
, pp. 12-21
-
-
Parker, D.1
-
26
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. on Information and Systems 90(4), 745-752 (2007).
-
(2007)
IEICE Trans. on Information and Systems
, vol.90
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
27
-
-
0036466927
-
Using model checking to help discover mode confusions and other automation surprises
-
Rushby, J.: Using model checking to help discover mode confusions and other automation surprises. Reliability Engineering and System Safety 75, 167-177 (2002).
-
(2002)
Reliability Engineering and System Safety
, vol.75
, pp. 167-177
-
-
Rushby, J.1
-
28
-
-
38049150939
-
Modeling control objectives for business process compliance
-
In: Alonso, G., Dadam, P., Rosemann, M. (eds.),. Springer, Heidelberg
-
Sadiq, W., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149-164. Springer, Heidelberg (2007).
-
(2007)
BPM 2007. LNCS
, vol.4714
, pp. 149-164
-
-
Sadiq, W.1
Governatori, G.2
Namiri, K.3
-
29
-
-
84856582306
-
A domain-specific language for modelling security objectives in a business process models of soa applications
-
Saleem, M., Jaafar, J., Hassan, M.: A domain-specific language for modelling security objectives in a business process models of soa applications. AISS 4(1), 353-362 (2012).
-
(2012)
AISS
, vol.4
, Issue.1
, pp. 353-362
-
-
Saleem, M.1
Jaafar, J.2
Hassan, M.3
-
30
-
-
84872768719
-
Aligning service-oriented architectures with security requirements
-
In: Meersman, R., et al. (eds.), Part I. LNCS,. Springer, Heidelberg
-
Salnitri, M., Dalpiaz, F., Giorgini, P.: Aligning service-oriented architectures with security requirements. In: Meersman, R., et al. (eds.) OTM 2012, Part I. LNCS, vol. 7565, pp. 232-249. Springer, Heidelberg (2012).
-
(2012)
OTM 2012
, vol.7565
, pp. 232-249
-
-
Salnitri, M.1
Dalpiaz, F.2
Giorgini, P.3
-
31
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
In: Focardi, R., Gorrieri, R. (eds.),. Springer, Heidelberg
-
Samarati, P., di Vimercati, S. C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137-196. Springer, Heidelberg (2001).
-
(2001)
FOSAD 2000. LNCS
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
di Vimercati, S.C.2
-
32
-
-
75649132702
-
Ontology-based representation of compliance requirements for service processes
-
In
-
Schmidt, R., Bartsch, C., Oberhauser, R.: Ontology-based representation of compliance requirements for service processes. In: Proc. of CEUR 2007 (2007).
-
(2007)
Proc. of CEUR 2007
-
-
Schmidt, R.1
Bartsch, C.2
Oberhauser, R.3
-
33
-
-
84863737158
-
Large-scale complex it systems
-
Sommerville, I., Cliff, D., Calinescu, R., Keen, J., Kelly, T., Kwiatkowska, M., Mcdermid, J., Paige, R.: Large-scale complex it systems. Commun. ACM 55(7), 71-77 (2012).
-
(2012)
Commun. ACM
, vol.55
, Issue.7
, pp. 71-77
-
-
Sommerville, I.1
Cliff, D.2
Calinescu, R.3
Keen, J.4
Kelly, T.5
Kwiatkowska, M.6
McDermid, J.7
Paige, R.8
-
34
-
-
63949084590
-
Model-driven business process security requirement specification
-
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. JSA 55(4), 211-223 (2009).
-
(2009)
JSA
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
35
-
-
47949088866
-
Rules and ontology in compliance management
-
In
-
Yip, F., Wong, A. K. Y., Parameswaran, N., Ray, P.: Rules and ontology in compliance management. In: In Proc. of EDOC, pp. 435-435 (2007).
-
(2007)
In Proc. of EDOC
, pp. 435
-
-
Yip, F.1
Wong, A.K.Y.2
Parameswaran, N.3
Ray, P.4
|