메뉴 건너뛰기




Volumn 1157, Issue , 2014, Pages

Transforming Socio-Technical security requirements in SecBPMN security policies

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SYSTEMS; SYSTEMS ENGINEERING;

EID: 84907074150     PISSN: 16130073     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (5)
  • 1
    • 84892380317 scopus 로고    scopus 로고
    • A reference model of information assurance and security
    • Y. Cherdantseva and J. Hilton. A reference model of information assurance and security. In Proc. of ARES '13, pages 546-555.
    • Proc. of ARES ' , vol.13 , pp. 546-555
    • Cherdantseva, Y.1    Hilton, J.2
  • 3
    • 27644537252 scopus 로고    scopus 로고
    • Modeling security requirements through ownership, permission and delegation
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements through Ownership, Permission and Delegation. In Proc. of RE'05, pages 167-176, 2005.
    • (2005) Proc. of RE'05 , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 4
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • H. Mouratidis and P. Giorgini. Secure Tropos: A Security-Oriented Extension of the Tropos methodology. IJSEKE, pages 285-309, 2007.
    • (2007) IJSEKE , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.