메뉴 건너뛰기




Volumn 235, Issue , 2015, Pages 91-107

Eliciting security requirements for business processes of legacy systems

Author keywords

BPMN; Business process modeling; Goal oriented security requirements; Legacy systems; MARBLE; Secure Tropos

Indexed keywords

MARBLE; SYSTEMS ENGINEERING;

EID: 84952642987     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-25897-3_7     Document Type: Conference Paper
Times cited : (8)

References (38)
  • 2
    • 0033184720 scopus 로고    scopus 로고
    • Legacy information systems: Issues and directions
    • Bisbal, J., Lawless, D., Wu, B., Grimson, J.: Legacy information systems: issues and directions. IEEE Softw. 16(5), 103–111 (1999)
    • (1999) IEEE Softw , vol.16 , Issue.5 , pp. 103-111
    • Bisbal, J.1    Lawless, D.2    Wu, B.3    Grimson, J.4
  • 4
    • 57749199308 scopus 로고    scopus 로고
    • Dynamic analysis of SQL statements for data-intensive applications reverse engineering
    • IEEE Computer Society
    • Cleve, A., Hainaut, J.L.: Dynamic analysis of SQL statements for data-intensive applications reverse engineering. In: 15th IEEE Working Conference on Reverse Engineering, pp. 192–196. IEEE Computer Society (2008)
    • (2008) 15Th IEEE Working Conference on Reverse Engineering , pp. 192-196
    • Cleve, A.1    Hainaut, J.L.2
  • 5
    • 50249128789 scopus 로고    scopus 로고
    • Reverse engineering of aspect oriented systems to support their comprehension, evolution, testing and assessment
    • IEEE Computer Society
    • Bernardi, M.: Reverse engineering of aspect oriented systems to support their comprehension, evolution, testing and assessment. In: 12th IEEE European Conference on Software Maintenance and Reengineering, pp. 290–293. IEEE Computer Society (2008)
    • (2008) 12Th IEEE European Conference on Software Maintenance and Reengineering , pp. 290-293
    • Bernardi, M.1
  • 8
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria based security requirements engineering process for the development of secure information systems
    • Mellado, D., Fernández-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stan. Interfaces 29(2), 244–253 (2007)
    • (2007) Comput. Stan. Interfaces , vol.29 , Issue.2 , pp. 244-253
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 9
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • Whitman, M.E.: Enemy at the gate: threats to information security. Commun. ACM 46(8), 91–95 (2003)
    • (2003) Commun. ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1
  • 10
    • 84892614680 scopus 로고    scopus 로고
    • A systematic review on security in process-aware information systems - constitution, challenges, and future directions
    • Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems - constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273–293 (2014)
    • (2014) Inf. Softw. Technol , vol.56 , Issue.3 , pp. 273-293
    • Leitner, M.1    Rinderle-Ma, S.2
  • 13
    • 79955884819 scopus 로고    scopus 로고
    • Secure business process model specification through a UML 2.0 activity diagram profile
    • Rodríguez, A., Fernández-Medina, E., Trujillo, J., Piattini, M.: Secure business process model specification through a UML 2.0 activity diagram profile. Decis. Support Syst. 51(3), 446–465 (2011)
    • (2011) Decis. Support Syst , vol.51 , Issue.3 , pp. 446-465
    • Rodríguez, A.1    Fernández-Medina, E.2    Trujillo, J.3    Piattini, M.4
  • 16
    • 70349678836 scopus 로고    scopus 로고
    • Business process management (BPM) standards: A survey. Bus
    • Ko, R.K., Lee, S.S., Lee, E.W.: Business process management (BPM) standards: a survey. Bus. Process Manage. 15(5), 744–791 (2009)
    • (2009) Process Manage , vol.15 , Issue.5 , pp. 744-791
    • Ko, R.K.1    Lee, S.S.2    Lee, E.W.3
  • 17
    • 38049160532 scopus 로고    scopus 로고
    • Requirements-driven design and configuration management of business processes
    • In: Alonso, G., Dadam, P., Rosemann, M. (eds.), Springer, Heidelberg
    • Lapouchnian, A., Yu, Y., Mylopoulos, J.: Requirements-driven design and configuration management of business processes. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 246–261. Springer, Heidelberg (2007)
    • (2007) BPM 2007. LNCS , vol.4714 , pp. 246-261
    • Lapouchnian, A.1    Yu, Y.2    Mylopoulos, J.3
  • 19
    • 56649086335 scopus 로고    scopus 로고
    • Relating business process models to goal-oriented requirements models in KAOS
    • In: Hoffmann, A., Kang, B.-H., Richards, D., Tsumoto, S. (eds.), Springer, Heidelberg
    • Koliadis, G., Ghose, A.: Relating business process models to goal-oriented requirements models in KAOS. In: Hoffmann, A., Kang, B.-H., Richards, D., Tsumoto, S. (eds.) PKAW 2006. LNCS (LNAI), vol. 4303, pp. 25–39. Springer, Heidelberg (2006)
    • (2006) PKAW 2006. LNCS (LNAI) , vol.4303 , pp. 25-39
    • Koliadis, G.1    Ghose, A.2
  • 20
    • 82055196738 scopus 로고    scopus 로고
    • Goal-driven business process derivation
    • In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.), Springer, Heidelberg
    • Ghose, A.K., Narendra, N.C., Ponnalagu, K., Panda, A., Gohad, A.: Goal-driven business process derivation. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 467–476. Springer, Heidelberg (2011)
    • (2011) ICSOC 2011. LNCS , vol.7084 , pp. 467-476
    • Ghose, A.K.1    Narendra, N.C.2    Ponnalagu, K.3    Panda, A.4    Gohad, A.5
  • 23
    • 38349028808 scopus 로고    scopus 로고
    • From business models to service-oriented design: A reference catalog approach
    • In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.), Springer, Heidelberg
    • Lo, A., Yu, E.: From business models to service-oriented design: a reference catalog approach. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 87–101. Springer, Heidelberg (2007)
    • (2007) ER 2007. LNCS , vol.4801 , pp. 87-101
    • Lo, A.1    Yu, E.2
  • 24
    • 79551553833 scopus 로고    scopus 로고
    • A goal-oriented requirements engineering method for business processes
    • In: Soffer, P., Proper, E. (eds.), Springer, Heidelberg
    • Decreus, K., Poels, G.: A goal-oriented requirements engineering method for business processes. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 29–43. Springer, Heidelberg (2011)
    • (2011) Caise Forum 2010. LNBIP , vol.72 , pp. 29-43
    • Decreus, K.1    Poels, G.2
  • 25
    • 84933672022 scopus 로고    scopus 로고
    • GoBIS: An integrated framework to analyse the goal and business process perspectives in information systems
    • Ruiz, M., Costal, D., España, S., Franch, X., Pastor, O.: GoBIS: an integrated framework to analyse the goal and business process perspectives in information systems. Inf. Syst. 53, 330–345 (2015)
    • (2015) Inf. Syst , vol.53 , pp. 330-345
    • Ruiz, M.1    Costal, D.2    España, S.3    Franch, X.4    Pastor, O.5
  • 27
    • 84864647111 scopus 로고    scopus 로고
    • Security requirements engineering for secure business processes
    • In: Niedrite, L., Strazdina, R., Wangler, B. (eds.), Springer, Heidelberg
    • Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security requirements engineering for secure business processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77–89. Springer, Heidelberg (2012)
    • (2012) BIR Workshops 2011. LNBIP , vol.106 , pp. 77-89
    • Paja, E.1    Giorgini, P.2    Paul, S.3    Meland, P.H.4
  • 28
    • 84907074150 scopus 로고    scopus 로고
    • Transforming socio-technical security requirements in SecBPMN security policies
    • Salnitri, M., Giorgini, P.: Transforming socio-technical security requirements in SecBPMN security policies. In: 7th International i* Workshop. CEUR (2014)
    • (2014) 7Th International I* Workshop. CEUR
    • Salnitri, M.1    Giorgini, P.2
  • 29
    • 84952692601 scopus 로고    scopus 로고
    • Information technology - Object Management Group Architecture-Driven Modernization (ADM) - Knowledge Discovery Meta-Model (KDM). Technical report
    • ISO/IEC 19506: Information technology - Object Management Group Architecture-Driven Modernization (ADM) - Knowledge Discovery Meta-Model (KDM). Technical report (2012)
    • (2012)
  • 31
    • 84952692602 scopus 로고    scopus 로고
    • Technical report
    • Object Management Group: Business Process Model and Notation (BPMN) Version 2.0. Technical report (2011)
    • (2011)
  • 34
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285–309 (2007)
    • (2007) Int. J. Softw. Eng. Knowl. Eng , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 35
    • 77954504239 scopus 로고    scopus 로고
    • From goal-driven security requirements engineering to secure design
    • Mouratidis, H., Jurjens, J.: From goal-driven security requirements engineering to secure design. Int. J. Intell. Syst. 25, 813–840 (2010)
    • (2010) Int. J. Intell. Syst , vol.25 , pp. 813-840
    • Mouratidis, H.1    Jurjens, J.2
  • 36
    • 84861141187 scopus 로고    scopus 로고
    • A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos
    • In: Nurcan, S. (ed.), Springer, Heidelberg
    • Pavlidis, M., Islam, S., Mouratidis, H.: A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos. In: Nurcan, S. (ed.) CAiSE Forum 2011. LNBIP, vol. 107, pp. 95–109. Springer, Heidelberg (2012)
    • (2012) Caise Forum 2011. LNBIP , vol.107 , pp. 95-109
    • Pavlidis, M.1    Islam, S.2    Mouratidis, H.3
  • 37
    • 84937458587 scopus 로고    scopus 로고
    • A framework for secure migration processes of legacy systems to the cloud
    • In: Persson, A., Stirna, J. (eds.), Springer, Heidelberg
    • Márquez, L., Rosado, D.G., Mouratidis, H., Mellado, D., Fernández-Medina, E.: A framework for secure migration processes of legacy systems to the cloud. In: Persson, A., Stirna, J. (eds.) CAiSE 2015 Workshops. LNBIP, vol. 215, pp. 507–517. Springer, Heidelberg (2015)
    • (2015) Caise 2015 Workshops. LNBIP , vol.215 , pp. 507-517
    • Márquez, L.1    Rosado, D.G.2    Mouratidis, H.3    Mellado, D.4    Fernández-Medina, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.