-
1
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
Mellado, D., Fernández-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stan. Interfaces 29(2), 244–253 (2007)
-
(2007)
Comput. Stan. Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
2
-
-
84864711339
-
Towards definition of secure business processes
-
In: Bajec, M., Eder, J. (eds.), Springer, Heidelberg
-
Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards definition of secure business processes. In: Bajec, M., Eder, J. (eds.) CAiSE Workshops 2012. LNBIP, vol. 112, pp. 1–15. Springer, Heidelberg (2012)
-
(2012)
Caise Workshops 2012. LNBIP
, vol.112
, pp. 1-15
-
-
Altuhhova, O.1
Matulevičius, R.2
Ahmed, N.3
-
3
-
-
84892405502
-
An Analysis and evaluation of security aspects in the business process model and notation
-
IEEE Press
-
Leitner, M., Miller, M., Rinderle-Ma, S.: An Analysis and evaluation of security aspects in the business process model and notation. In: 2013 IEEE International Conference on Availability, Reliability and Security. IEEE Press, pp. 262–267 (2013)
-
(2013)
2013 IEEE International Conference on Availability, Reliability and Security
, pp. 262-267
-
-
Leitner, M.1
Miller, M.2
Rinderle-Ma, S.3
-
4
-
-
33750957085
-
Secure business process management: A roadmap
-
IEEE Press
-
Neubauer, T., Klemen, M., Biffl, S.: Secure business process management: a roadmap. In: 1st IEEE International Conference on Availability, Reliability and Security, Vienna, Austria. IEEE Press, pp. 457–464 (2006)
-
(2006)
1St IEEE International Conference on Availability, Reliability and Security, Vienna, Austria
, pp. 457-464
-
-
Neubauer, T.1
Klemen, M.2
Biffl, S.3
-
5
-
-
84864559002
-
Non-functional requirements in business process modeling
-
Wollongong, Australia
-
Pavlovski, C.J., Zou, J.: Non-functional requirements in business process modeling. In: 5th Asia-Pacific Conference on Conceptual Modelling, vol. 79, Wollongong, Australia, pp. 103–112 (2008)
-
(2008)
5Th Asia-Pacific Conference on Conceptual Modelling
, vol.79
, pp. 103-112
-
-
Pavlovski, C.J.1
Zou, J.2
-
6
-
-
79551553833
-
A goal-oriented requirements engineering method for business processes
-
In: Soffer, P., Proper, E. (eds.), Springer, Heidelberg
-
Decreus, K., Poels, G.: A goal-oriented requirements engineering method for business processes. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 29–43. Springer, Heidelberg (2011)
-
(2011)
Caise Forum 2010. LNBIP
, vol.72
, pp. 29-43
-
-
Decreus, K.1
Poels, G.2
-
7
-
-
70349678836
-
Business process management (BPM) standards: A survey
-
Ko, R.K., Lee, S.S., Lee, E.W.: Business process management (BPM) standards: a survey. Bus. Process Manage. 15(5), 744–791 (2009)
-
(2009)
Bus. Process Manage
, vol.15
, Issue.5
, pp. 744-791
-
-
Ko, R.K.1
Lee, S.S.2
Lee, E.W.3
-
8
-
-
38049160532
-
Requirements-driven design and configuration management of business processes
-
In: Alonso, G., Dadam, P., Rosemann, M. (eds.), Springer, Heidelberg
-
Lapouchnian, A., Yu, Y., Mylopoulos, J.: Requirements-driven design and configuration management of business processes. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 246–261. Springer, Heidelberg (2007)
-
(2007)
BPM 2007. LNCS
, vol.4714
, pp. 246-261
-
-
Lapouchnian, A.1
Yu, Y.2
Mylopoulos, J.3
-
9
-
-
84906739770
-
Taking goal models downstream: A systematic roadmap
-
IEEE Press
-
Horkoff, J., Li, T., Li, F.L., Salnitri, M., Cardoso, E., Giorgini, P., Mylopoulos, J., Pimentel, J.A.: Taking goal models downstream: a systematic roadmap. In: 8th International Conference on Research Challenges in Information Science. IEEE Press, pp. 1–12 (2014)
-
(2014)
8Th International Conference on Research Challenges in Information Science
, pp. 1-12
-
-
Horkoff, J.1
Li, T.2
Li, F.L.3
Salnitri, M.4
Cardoso, E.5
Giorgini, P.6
Mylopoulos, J.7
Pimentel, J.A.8
-
10
-
-
56649086335
-
Relating business process models to goal-oriented requirements models in KAOS
-
In: Hoffmann, A., Kang, B.-H., Richards, D., Tsumoto, S. (eds.), Springer, Heidelberg
-
Koliadis, G., Ghose, A.K.: Relating business process models to goal-oriented requirements models in KAOS. In: Hoffmann, A., Kang, B.-H., Richards, D., Tsumoto, S. (eds.) PKAW 2006. LNCS (LNAI), vol. 4303, pp. 25–39. Springer, Heidelberg (2006)
-
(2006)
PKAW 2006. LNCS (LNAI)
, vol.4303
, pp. 25-39
-
-
Koliadis, G.1
Ghose, A.K.2
-
11
-
-
82055196738
-
Goal-driven business process derivation
-
In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.), Springer, Heidelberg
-
Ghose, A.K., Narendra, N.C., Ponnalagu, K., Panda, A., Gohad, A.: Goal-driven business process derivation. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) Service Oriented Computing. LNCS, vol. 7084, pp. 467–476. Springer, Heidelberg (2011)
-
(2011)
Service Oriented Computing. LNCS
, vol.7084
, pp. 467-476
-
-
Ghose, A.K.1
Narendra, N.C.2
Ponnalagu, K.3
Panda, A.4
Gohad, A.5
-
12
-
-
10444239472
-
Requirements-driven verification of Web services
-
Pistore, M., Roveri, M., Busetta, P.: Requirements-driven verification of Web services. Electr. Notes Theo. Comput. Sci. 105, 95–108 (2004)
-
(2004)
Electr. Notes Theo. Comput. Sci
, vol.105
, pp. 95-108
-
-
Pistore, M.1
Roveri, M.2
Busetta, P.3
-
13
-
-
84888246056
-
Bridging the gap between goals, agents and business processes
-
Guizzardi, R.S., Guizzardi, G., Almeida, J.A.P.A., Cardoso, E.: Bridging the gap between goals, agents and business processes. In: 4th International i* Workshop, CEUR, pp. 46–51 (2010)
-
(2010)
4Th International I* Workshop, CEUR
, pp. 46-51
-
-
Guizzardi, R.S.1
Guizzardi, G.2
Almeida, J.A.P.A.3
Cardoso, E.4
-
14
-
-
31044441861
-
Requirements engineering for e-business advantage
-
Bleistein, S.J., Cox, K., Verner, J., Phalp, K.T.: Requirements engineering for e-business advantage. Require. Eng. 11, 4–16 (2006)
-
(2006)
Require. Eng
, vol.11
, pp. 4-16
-
-
Bleistein, S.J.1
Cox, K.2
Verner, J.3
Phalp, K.T.4
-
15
-
-
38349028808
-
From business models to service-oriented design: A reference catalog approach
-
In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.), Springer, Heidelberg
-
Lo, A., Yu, E.: From business models to service-oriented design: a reference catalog approach. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 87–101. Springer, Heidelberg (2007)
-
(2007)
ER 2007. LNCS
, vol.4801
, pp. 87-101
-
-
Lo, A.1
Yu, E.2
-
16
-
-
84903164208
-
Integrating the goal and business process perspectives in information system analysis
-
In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.), Springer, Heidelberg
-
Ruiz, M., Costal, D., España, S., Franch, X., Pastor, Ó.: Integrating the goal and business process perspectives in information system analysis. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 332–346. Springer, Heidelberg (2014)
-
(2014)
Caise 2014. LNCS
, vol.8484
, pp. 332-346
-
-
Ruiz, M.1
Costal, D.2
España, S.3
Franch, X.4
Pastor, Ó.5
-
17
-
-
58449093195
-
Secure workflow development from early requirements analysis
-
Séguran, M., Hébert, C., Frankova, G.: Secure workflow development from early requirements analysis. In: The 6th European Conference on Web Services. IEEE, pp. 125–134 (2008)
-
(2008)
The 6Th European Conference on Web Services. IEEE
, pp. 125-134
-
-
Séguran, M.1
Hébert, C.2
Frankova, G.3
-
18
-
-
84864647111
-
Security requirements engineering for secure business processes
-
In: Niedrite, L., Strazdina, R., Wangler, B. (eds.), Springer, Heidelberg
-
Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security requirements engineering for secure business processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77–89. Springer, Heidelberg (2012)
-
(2012)
BIR Workshops 2011. LNBIP
, vol.106
, pp. 77-89
-
-
Paja, E.1
Giorgini, P.2
Paul, S.3
Meland, P.H.4
-
19
-
-
84907074150
-
Transforming socio-technical security requirements in SecBPMN security policies
-
Salnitri, M., Giorgini, P.: Transforming socio-technical security requirements in SecBPMN security policies. In: 7th International i* Workshop, Thessaloniki, Greece, CEUR (2014)
-
(2014)
7Th International I* Workshop, Thessaloniki, Greece, CEUR
-
-
Salnitri, M.1
Giorgini, P.2
-
20
-
-
73649102111
-
Practical challenges for methods transforming i* goal models into business process models
-
IEEE Press
-
Decreus, K., Snoeck, M., Poels, G.: Practical challenges for methods transforming i* goal models into business process models. In: IEEE International Conference on Requirements Engineering. IEEE Press, pp. 15–23 (2009)
-
(2009)
IEEE International Conference on Requirements Engineering
, pp. 15-23
-
-
Decreus, K.1
Snoeck, M.2
Poels, G.3
-
21
-
-
85006049205
-
An experimental study on the design and modeling of security concepts in business processes
-
In: Grabis, J., Kirikova, M., Zdravkovic, J., Stirna, J. (eds.), Springer, Heidelberg
-
Leitner, M., Schefer-Wenzl, S., Rinderle-Ma, S., Strembeck, M.: An experimental study on the design and modeling of security concepts in business processes. In: Grabis, J., Kirikova, M., Zdravkovic, J., Stirna, J. (eds.) PoEM 2013. LNBIP, vol. 165, pp. 236–250. Springer, Heidelberg (2013)
-
(2013)
Poem 2013. LNBIP
, vol.165
, pp. 236-250
-
-
Leitner, M.1
Schefer-Wenzl, S.2
Rinderle-Ma, S.3
Strembeck, M.4
-
24
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. E90–D(4), 745–752 (2007)
-
(2007)
IEICE Trans. Inf. Syst
, vol.E90D
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
25
-
-
84904562479
-
Modeling and verifying security policies in business processes
-
In: Bider, I., Gaaloul, K., Krogstie, J., Nurcan, S., Proper, H.A., Schmidt, R., Soffer, P. (eds.), Springer, Heidelberg
-
Salnitri, M., Dalpiaz, F., Giorgini, P.: Modeling and verifying security policies in business processes. In: Bider, I., Gaaloul, K., Krogstie, J., Nurcan, S., Proper, H.A., Schmidt, R., Soffer, P. (eds.) BPMDS 2014 and EMMSAD 2014. LNBIP, vol. 175, pp. 200–214. Springer, Heidelberg (2014)
-
(2014)
BPMDS 2014 and EMMSAD 2014. LNBIP
, vol.175
, pp. 200-214
-
-
Salnitri, M.1
Dalpiaz, F.2
Giorgini, P.3
-
26
-
-
84864034347
-
SecureBPMN: Modeling and enforcing access control requirements in business processes
-
ACM
-
Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: The 17th ACM symposium on Access Control Models and Technologies. ACM, pp. 123–126 (2012)
-
(2012)
The 17Th ACM Symposium on Access Control Models and Technologies
, pp. 123-126
-
-
Brucker, A.D.1
Hang, I.2
Lückemeyer, G.3
Ruparel, R.4
-
27
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
In: Alonso, G., Dadam, P., Rosemann, M. (eds.), Springer, Heidelberg
-
Wolter, C., Schaad, A.: Modeling of task-based authorization constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64–79. Springer, Heidelberg (2007)
-
(2007)
BPM 2007. LNCS
, vol.4714
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
28
-
-
84916229046
-
Classification of domain-specific BPMN extensions
-
Frank, U., Loucopoulos, P., Pastor, Ó., Petrounias, I. (eds.), Springer, Heidelberg
-
Braun, R., Esswein, W.: Classification of domain-specific BPMN extensions. In: Frank, U., Loucopoulos, P., Pastor, Ó., Petrounias, I. (eds.) PoEM 2014. LNBIP, vol. 197, pp. 42–57. Springer, Heidelberg (2014)
-
(2014)
Poem 2014. LNBIP
, vol.197
, pp. 42-57
-
-
Braun, R.1
Esswein, W.2
-
29
-
-
84879849848
-
Business process management : A comprehensive survey
-
van der Aalst, W.M.: Business process management : a comprehensive survey. ISRN Softw. Eng. 2013, 1–37 (2013)
-
(2013)
ISRN Softw. Eng
, pp. 1-37
-
-
Van Der Aalst, W.M.1
-
30
-
-
69849109062
-
Business process modeling: Current issues and future challenges
-
In: van Eck, P., Gordijn, J., Wieringa, R. (eds.), Springer, Heidelberg
-
Indulska, M., Recker, J., Rosemann, M., Green, P.: Business process modeling: current issues and future challenges. In: van Eck, P., Gordijn, J., Wieringa, R. (eds.) CAiSE 2009. LNCS, vol. 5565, pp. 501–514. Springer, Heidelberg (2009)
-
(2009)
Caise 2009. LNCS
, vol.5565
, pp. 501-514
-
-
Indulska, M.1
Recker, J.2
Rosemann, M.3
Green, P.4
-
31
-
-
84892614680
-
A systematic review on security in process-aware information systems - constitution, challenges, and future directions
-
Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems - constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273–293 (2014)
-
(2014)
Inf. Softw. Technol.
, vol.56
, Issue.3
, pp. 273-293
-
-
Leitner, M.1
Rinderle-Ma, S.2
-
32
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)
-
(2007)
Int. J. Softw. Eng. Knowl. Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
33
-
-
84861141187
-
A CASE tool to support automated modelling and analysis of security requirements
-
In: Nurcan, S. (ed.), Springer, Heidelberg
-
Pavlidis, M., Islam, S., Mouratidis, H.: A CASE tool to support automated modelling and analysis of security requirements. In: Nurcan, S. (ed.) IS Olympics: Information Systems in a Diverse World, pp. 95–109. Springer, Heidelberg (2012)
-
(2012)
IS Olympics: Information Systems in a Diverse World
, pp. 95-109
-
-
Pavlidis, M.1
Islam, S.2
Mouratidis, H.3
|