-
1
-
-
8444222126
-
Legacy system migration: A legacy data migration engine
-
Wu, B., Lawless, D., Bisbal, J., Grimson, J., Wade, V., O’Sullivan, D., Richardson, R.: Legacy system migration: a legacy data migration engine. In: 17th International Database Conference, pp. 129–138 (1997)
-
(1997)
17Th International Database Conference
, pp. 129-138
-
-
Wu, B.1
Lawless, D.2
Bisbal, J.3
Grimson, J.4
Wade, V.5
O’Sullivan, D.6
Richardson, R.7
-
2
-
-
0033184720
-
Legacy information systems: Issues and directions
-
Bisbal, J., Lawless, D., Wu, B., Grimson, J.: Legacy information systems: issues and directions. IEEE Softw. 16(5), 103–111 (1999)
-
(1999)
IEEE Softw
, vol.16
, Issue.5
, pp. 103-111
-
-
Bisbal, J.1
Lawless, D.2
Wu, B.3
Grimson, J.4
-
3
-
-
80455123513
-
A
-
Technical report
-
Bisbal, J., Lawless, D., Wu, B., Grimson, J., Wade, V., Richardson, R., Sullivan, D.O.: A Survey of Research into Legacy System Migration. Technical report (1997)
-
(1997)
Survey of Research into Legacy System Migration
-
-
Bisbal, J.1
Lawless, D.2
Wu, B.3
Grimson, J.4
Wade, V.5
Richardson, R.6
Sullivan, D.O.7
-
4
-
-
57749199308
-
Dynamic analysis of SQL statements for data-intensive applications reverse engineering
-
IEEE Computer Society
-
Cleve, A., Hainaut, J.L.: Dynamic analysis of SQL statements for data-intensive applications reverse engineering. In: 15th IEEE Working Conference on Reverse Engineering, pp. 192–196. IEEE Computer Society (2008)
-
(2008)
15Th IEEE Working Conference on Reverse Engineering
, pp. 192-196
-
-
Cleve, A.1
Hainaut, J.L.2
-
5
-
-
50249128789
-
Reverse engineering of aspect oriented systems to support their comprehension, evolution, testing and assessment
-
IEEE Computer Society
-
Bernardi, M.: Reverse engineering of aspect oriented systems to support their comprehension, evolution, testing and assessment. In: 12th IEEE European Conference on Software Maintenance and Reengineering, pp. 290–293. IEEE Computer Society (2008)
-
(2008)
12Th IEEE European Conference on Software Maintenance and Reengineering
, pp. 290-293
-
-
Bernardi, M.1
-
6
-
-
79959921747
-
Business process archeology using MARBLE
-
Pérez-Castillo, R., De Guzmán, I.G.R., Piattini, M.: Business process archeology using MARBLE. Inf. Softw. Technol. 53(10), 1023–1044 (2011)
-
(2011)
Inf. Softw. Technol
, vol.53
, Issue.10
, pp. 1023-1044
-
-
Pérez-Castillo, R.1
De Guzmán, I.G.R.2
Piattini, M.3
-
7
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
IEEE Computer Society
-
Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: 11th IEEE International Requirements Engineering Conference, pp. 151–161. IEEE Computer Society (2003)
-
(2003)
11Th IEEE International Requirements Engineering Conference
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
8
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
Mellado, D., Fernández-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stan. Interfaces 29(2), 244–253 (2007)
-
(2007)
Comput. Stan. Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
9
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
Whitman, M.E.: Enemy at the gate: threats to information security. Commun. ACM 46(8), 91–95 (2003)
-
(2003)
Commun. ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
10
-
-
84892614680
-
A systematic review on security in process-aware information systems - constitution, challenges, and future directions
-
Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems - constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273–293 (2014)
-
(2014)
Inf. Softw. Technol
, vol.56
, Issue.3
, pp. 273-293
-
-
Leitner, M.1
Rinderle-Ma, S.2
-
11
-
-
33750957085
-
Secure business process management: A roadmap
-
Vienna, Austria, IEEE Computer Society
-
Neubauer, T., Klemen, M., Biffl, S.: Secure business process management: a roadmap. In: 1st IEEE International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 457–464. IEEE Computer Society (2006)
-
(2006)
1St IEEE International Conference on Availability, Reliability and Security
, pp. 457-464
-
-
Neubauer, T.1
Klemen, M.2
Biffl, S.3
-
13
-
-
79955884819
-
Secure business process model specification through a UML 2.0 activity diagram profile
-
Rodríguez, A., Fernández-Medina, E., Trujillo, J., Piattini, M.: Secure business process model specification through a UML 2.0 activity diagram profile. Decis. Support Syst. 51(3), 446–465 (2011)
-
(2011)
Decis. Support Syst
, vol.51
, Issue.3
, pp. 446-465
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Trujillo, J.3
Piattini, M.4
-
14
-
-
77954723853
-
MARBLE: Modernization approach for recovering business processes from legacy information systems
-
Pérez-Castillo, R., De Guzmán, I.G.R., vila Garca, O., Piattini, M.: MARBLE: modernization approach for recovering business processes from legacy information systems. In: International Workshop on Reverse Engineering Models from Software Artifacts, pp. 17–20 (2009)
-
(2009)
International Workshop on Reverse Engineering Models from Software Artifacts
, pp. 17-20
-
-
Pérez-Castillo, R.1
De Guzmán, I.G.R.2
Vila Garca, O.3
Piattini, M.4
-
15
-
-
83455221612
-
MARBLE. A business process archeology tool
-
IEEE Computer Society
-
Pérez-Castillo, R., Fernández-Ropero, M., De Guzmán, I.G.R., Piattini, M.: MARBLE. A business process archeology tool. In: 27th IEEE International Conference on Software Maintenance, pp. 578–581. IEEE Computer Society (2011)
-
(2011)
27Th IEEE International Conference on Software Maintenance
, pp. 578-581
-
-
Pérez-Castillo, R.1
Fernández-Ropero, M.2
De Guzmán, I.G.R.3
Piattini, M.4
-
16
-
-
70349678836
-
Business process management (BPM) standards: A survey. Bus
-
Ko, R.K., Lee, S.S., Lee, E.W.: Business process management (BPM) standards: a survey. Bus. Process Manage. 15(5), 744–791 (2009)
-
(2009)
Process Manage
, vol.15
, Issue.5
, pp. 744-791
-
-
Ko, R.K.1
Lee, S.S.2
Lee, E.W.3
-
17
-
-
38049160532
-
Requirements-driven design and configuration management of business processes
-
In: Alonso, G., Dadam, P., Rosemann, M. (eds.), Springer, Heidelberg
-
Lapouchnian, A., Yu, Y., Mylopoulos, J.: Requirements-driven design and configuration management of business processes. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 246–261. Springer, Heidelberg (2007)
-
(2007)
BPM 2007. LNCS
, vol.4714
, pp. 246-261
-
-
Lapouchnian, A.1
Yu, Y.2
Mylopoulos, J.3
-
18
-
-
84906739770
-
Taking goal models downstream: A systematic roadmap
-
IEEE Computer Society
-
Horkoff, J., Li, T., Li, F.L., Salnitri, M., Cardoso, E., Giorgini, P., Mylopoulos, J., Pimentel, J.A.: Taking goal models downstream: a systematic roadmap. In: 8th IEEE International Conference on Research Challenges in Information Science, pp. 1–12. IEEE Computer Society (2014)
-
(2014)
8Th IEEE International Conference on Research Challenges in Information Science
, pp. 1-12
-
-
Horkoff, J.1
Li, T.2
Li, F.L.3
Salnitri, M.4
Cardoso, E.5
Giorgini, P.6
Mylopoulos, J.7
Pimentel, J.A.8
-
19
-
-
56649086335
-
Relating business process models to goal-oriented requirements models in KAOS
-
In: Hoffmann, A., Kang, B.-H., Richards, D., Tsumoto, S. (eds.), Springer, Heidelberg
-
Koliadis, G., Ghose, A.: Relating business process models to goal-oriented requirements models in KAOS. In: Hoffmann, A., Kang, B.-H., Richards, D., Tsumoto, S. (eds.) PKAW 2006. LNCS (LNAI), vol. 4303, pp. 25–39. Springer, Heidelberg (2006)
-
(2006)
PKAW 2006. LNCS (LNAI)
, vol.4303
, pp. 25-39
-
-
Koliadis, G.1
Ghose, A.2
-
20
-
-
82055196738
-
Goal-driven business process derivation
-
In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.), Springer, Heidelberg
-
Ghose, A.K., Narendra, N.C., Ponnalagu, K., Panda, A., Gohad, A.: Goal-driven business process derivation. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 467–476. Springer, Heidelberg (2011)
-
(2011)
ICSOC 2011. LNCS
, vol.7084
, pp. 467-476
-
-
Ghose, A.K.1
Narendra, N.C.2
Ponnalagu, K.3
Panda, A.4
Gohad, A.5
-
21
-
-
10444239472
-
Requirements-driven verification of web services
-
Pistore, M., Roveri, M., Busetta, P.: Requirements-driven verification of web services. Electron. Notes Theor. Comput. Sci. 105, 95–108 (2004)
-
(2004)
Electron. Notes Theor. Comput. Sci
, vol.105
, pp. 95-108
-
-
Pistore, M.1
Roveri, M.2
Busetta, P.3
-
22
-
-
84888246056
-
Bridging the gap between goals, agents and business processes
-
CEUR
-
Guizzardi, R.S.S., Guizzardi, G., Almeida, J.P.A., Cardoso, E.: Bridging the gap between goals, agents and business processes. In: 4th International i* Workshop, pp. 46–51. CEUR (2010)
-
(2010)
4Th International I* Workshop
, pp. 46-51
-
-
Guizzardi, R.S.S.1
Guizzardi, G.2
Almeida, J.P.A.3
Cardoso, E.4
-
23
-
-
38349028808
-
From business models to service-oriented design: A reference catalog approach
-
In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.), Springer, Heidelberg
-
Lo, A., Yu, E.: From business models to service-oriented design: a reference catalog approach. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 87–101. Springer, Heidelberg (2007)
-
(2007)
ER 2007. LNCS
, vol.4801
, pp. 87-101
-
-
Lo, A.1
Yu, E.2
-
24
-
-
79551553833
-
A goal-oriented requirements engineering method for business processes
-
In: Soffer, P., Proper, E. (eds.), Springer, Heidelberg
-
Decreus, K., Poels, G.: A goal-oriented requirements engineering method for business processes. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 29–43. Springer, Heidelberg (2011)
-
(2011)
Caise Forum 2010. LNBIP
, vol.72
, pp. 29-43
-
-
Decreus, K.1
Poels, G.2
-
25
-
-
84933672022
-
GoBIS: An integrated framework to analyse the goal and business process perspectives in information systems
-
Ruiz, M., Costal, D., España, S., Franch, X., Pastor, O.: GoBIS: an integrated framework to analyse the goal and business process perspectives in information systems. Inf. Syst. 53, 330–345 (2015)
-
(2015)
Inf. Syst
, vol.53
, pp. 330-345
-
-
Ruiz, M.1
Costal, D.2
España, S.3
Franch, X.4
Pastor, O.5
-
26
-
-
58449093195
-
Secure workflow development from early requirements analysis
-
IEEE Computer Society
-
Séguran, M., Hébert, C., Frankova, G.: Secure workflow development from early requirements analysis. In: 6th IEEE European Conference on Web Services, pp. 125–134. IEEE Computer Society (2008)
-
(2008)
6Th IEEE European Conference on Web Services
, pp. 125-134
-
-
Séguran, M.1
Hébert, C.2
Frankova, G.3
-
27
-
-
84864647111
-
Security requirements engineering for secure business processes
-
In: Niedrite, L., Strazdina, R., Wangler, B. (eds.), Springer, Heidelberg
-
Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security requirements engineering for secure business processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77–89. Springer, Heidelberg (2012)
-
(2012)
BIR Workshops 2011. LNBIP
, vol.106
, pp. 77-89
-
-
Paja, E.1
Giorgini, P.2
Paul, S.3
Meland, P.H.4
-
28
-
-
84907074150
-
Transforming socio-technical security requirements in SecBPMN security policies
-
Salnitri, M., Giorgini, P.: Transforming socio-technical security requirements in SecBPMN security policies. In: 7th International i* Workshop. CEUR (2014)
-
(2014)
7Th International I* Workshop. CEUR
-
-
Salnitri, M.1
Giorgini, P.2
-
29
-
-
84952692601
-
-
Information technology - Object Management Group Architecture-Driven Modernization (ADM) - Knowledge Discovery Meta-Model (KDM). Technical report
-
ISO/IEC 19506: Information technology - Object Management Group Architecture-Driven Modernization (ADM) - Knowledge Discovery Meta-Model (KDM). Technical report (2012)
-
(2012)
-
-
-
30
-
-
84859532223
-
A family of case studies on business process mining using MARBLE
-
Pérez-Castillo, R., Cruz-Lemus, J.A., De Guzmán, I.G.R., Piattini, M.: A family of case studies on business process mining using MARBLE. J. Syst. Softw. 85(6), 1370–1385 (2012)
-
(2012)
J. Syst. Softw
, vol.85
, Issue.6
, pp. 1370-1385
-
-
Pérez-Castillo, R.1
Cruz-Lemus, J.A.2
De Guzmán, I.G.R.3
Piattini, M.4
-
31
-
-
84952692602
-
-
Technical report
-
Object Management Group: Business Process Model and Notation (BPMN) Version 2.0. Technical report (2011)
-
(2011)
-
-
-
32
-
-
84922229542
-
Graph-based business process model refactoring
-
CEUR
-
Fernández-Ropero, M., Pérez-Castillo, R., Piattini, M.: Graph-based business process model refactoring. In: 3rd International Symposium on Data-driven Process Discovery and Analysis, pp. 16–30. CEUR (2013)
-
(2013)
3Rd International Symposium on Data-Driven Process Discovery and Analysis
, pp. 16-30
-
-
Fernández-Ropero, M.1
Pérez-Castillo, R.2
Piattini, M.3
-
33
-
-
84877994649
-
Assessing the best-order for business process model refactoring
-
ACM
-
Fernández-Ropero, M., Pérez-Castillo, R., Cruz-Lemus, J.A., Piattini, M.: Assessing the best-order for business process model refactoring. In: 28th Annual ACM Symposium on Applied Computing, pp. 1397–1402. ACM (2013)
-
(2013)
28Th Annual ACM Symposium on Applied Computing
, pp. 1397-1402
-
-
Fernández-Ropero, M.1
Pérez-Castillo, R.2
Cruz-Lemus, J.A.3
Piattini, M.4
-
34
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285–309 (2007)
-
(2007)
Int. J. Softw. Eng. Knowl. Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
35
-
-
77954504239
-
From goal-driven security requirements engineering to secure design
-
Mouratidis, H., Jurjens, J.: From goal-driven security requirements engineering to secure design. Int. J. Intell. Syst. 25, 813–840 (2010)
-
(2010)
Int. J. Intell. Syst
, vol.25
, pp. 813-840
-
-
Mouratidis, H.1
Jurjens, J.2
-
36
-
-
84861141187
-
A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos
-
In: Nurcan, S. (ed.), Springer, Heidelberg
-
Pavlidis, M., Islam, S., Mouratidis, H.: A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos. In: Nurcan, S. (ed.) CAiSE Forum 2011. LNBIP, vol. 107, pp. 95–109. Springer, Heidelberg (2012)
-
(2012)
Caise Forum 2011. LNBIP
, vol.107
, pp. 95-109
-
-
Pavlidis, M.1
Islam, S.2
Mouratidis, H.3
-
37
-
-
84937458587
-
A framework for secure migration processes of legacy systems to the cloud
-
In: Persson, A., Stirna, J. (eds.), Springer, Heidelberg
-
Márquez, L., Rosado, D.G., Mouratidis, H., Mellado, D., Fernández-Medina, E.: A framework for secure migration processes of legacy systems to the cloud. In: Persson, A., Stirna, J. (eds.) CAiSE 2015 Workshops. LNBIP, vol. 215, pp. 507–517. Springer, Heidelberg (2015)
-
(2015)
Caise 2015 Workshops. LNBIP
, vol.215
, pp. 507-517
-
-
Márquez, L.1
Rosado, D.G.2
Mouratidis, H.3
Mellado, D.4
Fernández-Medina, E.5
-
38
-
-
84963610073
-
Modelling secure cloud systems based on system requirements
-
Shei, S., Márquez Alcañiz, L., Mouratidis, H., Delaney, A., Rosado, D.G., Fernández-Medina, E.: Modelling secure cloud systems based on system requirements. In: 2nd Evolving Security & Privacy Requirements Engineering Workshop: Co-located with the 23rd IEEE International Requirements Engineering Conference, pp. 19–24 (2015)
-
(2015)
2Nd Evolving Security & Privacy Requirements Engineering Workshop: Co-Located with the 23Rd IEEE International Requirements Engineering Conference
, pp. 19-24
-
-
Shei, S.1
Márquez Alcañiz, L.2
Mouratidis, H.3
Delaney, A.4
Rosado, D.G.5
Fernández-Medina, E.6
|