메뉴 건너뛰기




Volumn 165 LNBIP, Issue , 2013, Pages 236-250

An experimental study on the design and modeling of security concepts in business processes

Author keywords

BPMN; Business processes; Empirical evaluation; Icons; Modeling; Security; Visualization

Indexed keywords

FLOW VISUALIZATION; MODELS; PETROLEUM RESERVOIR EVALUATION; SEMANTICS;

EID: 85006049205     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-41641-5_17     Document Type: Conference Paper
Times cited : (8)

References (33)
  • 1
    • 84911974729 scopus 로고    scopus 로고
    • Business Process Management: A Boundaryless Approach to Modern Competitiveness
    • Zairi, M.: Business Process Management: A Boundaryless Approach to Modern Competitiveness. Business Process Management Journal 3(1), 64-80 (1997)
    • (1997) Business Process Management Journal , vol.3 , Issue.1 , pp. 64-80
    • Zairi, M.1
  • 2
    • 77049089544 scopus 로고    scopus 로고
    • Modeling Languages for Business Processes and Business Rules: A Representational Analysis
    • zur Muehlen, M., Indulska, M.: Modeling Languages for Business Processes and Business Rules: A Representational Analysis. Information Systems 35(4) (2010)
    • (2010) Information Systems , vol.35 , Issue.4
    • Zur, M.M.1    Indulska, M.2
  • 4
    • 79956069069 scopus 로고    scopus 로고
    • OMG, OMG Document formal/2011-01-03, Object Management Group (January
    • OMG: Business process model and notation (BPMN) version 2.0. OMG Document formal/2011-01-03, Object Management Group (January 2011)
    • (2011) Business Process Model and Notation (BPMN) Version 2.0
  • 8
    • 34250015784 scopus 로고    scopus 로고
    • Embedding Information Security into the Organization
    • Johnson, M.E., Goetz, E.: Embedding Information Security into the Organization. IEEE Security & Privacy 5(3) (2007)
    • (2007) IEEE Security & Privacy , vol.5 , Issue.3
    • Johnson, M.E.1    Goetz, E.2
  • 9
    • 77249095368 scopus 로고    scopus 로고
    • Scenario-Driven Role Engineering
    • Strembeck, M.: Scenario-Driven Role Engineering. IEEE Security & Privacy 8(1) (2010)
    • (2010) IEEE Security & Privacy , vol.8 , Issue.1
    • Strembeck, M.1
  • 10
  • 14
    • 25144499038 scopus 로고    scopus 로고
    • Workflow Resource Patterns: Identification, Representation and Tool Support
    • In: Pastor, Ó., Falcão e Cunha, J. (eds.), Springer, Heidelberg
    • Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216-232. Springer, Heidelberg (2005)
    • (2005) CAiSE 2005. LNCS , vol.3520 , pp. 216-232
    • Russell, N.1    van der Aalst, W.M.P.2    Ter, H.A.H.M.3    Edmond, D.4
  • 16
    • 84858308888 scopus 로고    scopus 로고
    • Towards a more semantically transparent i* visual syntax
    • In: Regnell, B., Damian, D. (eds.), Springer, Heidelberg
    • Genon, N., Caire, P., Toussaint, H., Heymans, P., Moody, D.: Towards a more semantically transparent i* visual syntax. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol. 7195, pp. 140-146. Springer, Heidelberg (2012)
    • (2012) REFSQ 2011. LNCS , vol.7195 , pp. 140-146
    • Genon, N.1    Caire, P.2    Toussaint, H.3    Heymans, P.4    Moody, D.5
  • 17
    • 73449140991 scopus 로고    scopus 로고
    • The physics of notations: Toward a scientific basis for constructing visual notations in software engineering
    • Moody, D.: The physics of notations: Toward a scientific basis for constructing visual notations in software engineering. IEEE Transactions on Software Engineering 35(6), 756-779 (2009)
    • (2009) IEEE Transactions On Software Engineering , vol.35 , Issue.6 , pp. 756-779
    • Moody, D.1
  • 18
    • 25844517955 scopus 로고    scopus 로고
    • Theoretical and practical issues in evaluating the quality of conceptual models: Current state and future directions
    • Moody, D.L.: Theoretical and practical issues in evaluating the quality of conceptual models: current state and future directions. Data & Knowledge Engineering 55(3), 243-276 (2005)
    • (2005) Data & Knowledge Engineering , vol.55 , Issue.3 , pp. 243-276
    • Moody, D.L.1
  • 19
    • 84943253914 scopus 로고    scopus 로고
    • Cognitive dimensions of notations: Design tools for cognitive technology
    • In: Beynon, M., Nehaniv, C.L., Dautenhahn, K. (eds.), Springer, Heidelberg
    • Blackwell, A.F., et al.: Cognitive dimensions of notations: Design tools for cognitive technology. In: Beynon, M., Nehaniv, C.L., Dautenhahn, K. (eds.) CT 2001. LNCS (LNAI), vol. 2117, pp. 325-341. Springer, Heidelberg (2001)
    • (2001) CT 2001. LNCS (LNAI) , vol.2117 , pp. 325-341
    • Blackwell, A.F.1
  • 21
    • 33644645323 scopus 로고    scopus 로고
    • Process models representing knowledge for action: A revised quality framework
    • Krogstie, J., Sindre, G., Jørgensen, H.: Process models representing knowledge for action: a revised quality framework. European Journal of Information Systems 15(1), 91-102 (2006)
    • (2006) European Journal of Information Systems , vol.15 , Issue.1 , pp. 91-102
    • Krogstie, J.1    Sindre, G.2    Jørgensen, H.3
  • 22
    • 79952273712 scopus 로고    scopus 로고
    • Analysing the cognitive effectiveness of the BPMN 2.0 visual notation
    • In: Malloy, B., Staab, S., van den Brand, M. (eds.), Springer, Heidelberg
    • Genon, N., Heymans, P., Amyot, D.: Analysing the cognitive effectiveness of the BPMN 2.0 visual notation. In: Malloy, B., Staab, S., van den Brand, M. (eds.) SLE 2010. LNCS, vol. 6563, pp. 377-396. Springer, Heidelberg (2011)
    • (2011) SLE 2010. LNCS , vol.6563 , pp. 377-396
    • Genon, N.1    Heymans, P.2    Amyot, D.3
  • 23
    • 84876355463 scopus 로고    scopus 로고
    • On the cognitive effectiveness of routing symbols in process modeling languages
    • In: Abramowicz, W., Tolksdorf, R. (eds.), Springer, Heidelberg
    • Figl, K., Mendling, J., Strembeck, M., Recker, J.: On the cognitive effectiveness of routing symbols in process modeling languages. In: Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. LNBIP, vol. 47, pp. 230-241. Springer, Heidelberg (2010)
    • (2010) BIS 2010. LNBIP , vol.47 , pp. 230-241
    • Figl, K.1    Mendling, J.2    Strembeck, M.3    Recker, J.4
  • 24
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.), Springer, Heidelberg
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
    • (2002) UML 2002. LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 25
    • 79960277885 scopus 로고    scopus 로고
    • Modeling support for confidentiality and integrity of object flows in activity models
    • In: Abramowicz, W. (ed.), Springer, Heidelberg
    • Hoisl, B., Strembeck, M.: Modeling support for confidentiality and integrity of object flows in activity models. In: Abramowicz, W. (ed.) BIS 2011. LNBIP, vol. 87, pp. 278-289. Springer, Heidelberg (2011)
    • (2011) BIS 2011. LNBIP , vol.87 , pp. 278-289
    • Hoisl, B.1    Strembeck, M.2
  • 26
    • 38149121542 scopus 로고    scopus 로고
    • Mal-Activity Diagrams for Capturing Attacks on Business Processes
    • In: Sawyer, P., Heymans, P. (eds.), Springer, Heidelberg
    • Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
    • (2007) REFSQ 2007. LNCS , vol.4542 , pp. 355-366
    • Sindre, G.1
  • 27
    • 0010381933 scopus 로고    scopus 로고
    • Internet Security Glossary. Request for Comments
    • May
    • Shirey, R.: Internet Security Glossary. Request for Comments, vol. 2828. IETF (May 2000)
    • (2000) IETF , vol.2828
    • Shirey, R.1
  • 28
    • 30644462262 scopus 로고    scopus 로고
    • Information technology Industry Council, Technical Report ANSI INCITS 359-2004, American National Standards Institute, Inc
    • Information technology Industry Council: Information technology - role based access control. Technical Report ANSI INCITS 359-2004, American National Standards Institute, Inc (2004)
    • (2004) Information Technology - Role Based Access Control
  • 29
    • 0029327901 scopus 로고
    • Why looking isn't always seeing: Readership skills and graphical programming
    • Petre, M.: Why looking isn't always seeing: Readership skills and graphical programming. Communications of the ACM 38(6) (1995)
    • (1995) Communications of the ACM , vol.38 , Issue.6
    • Petre, M.1
  • 31
    • 79952439750 scopus 로고    scopus 로고
    • Modeling Process-related RBAC Models with Extended UML Activity Models
    • Strembeck, M., Mendling, J.: Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology 53(5) (2011)
    • (2011) Information and Software Technology , vol.53 , Issue.5
    • Strembeck, M.1    Mendling, J.2
  • 32
    • 84906686775 scopus 로고    scopus 로고
    • A UML Extension for Modeling Break-Glass Policies
    • Rinderle-Ma, S., Weske, M. (eds.)
    • Schefer-Wenzl, S., Strembeck, M.: A UML Extension for Modeling Break-Glass Policies. In: Rinderle-Ma, S., Weske, M. (eds.) EMISA 2012. LNI, vol. 206, pp. 25-38. GI (2012)
    • (2012) EMISA 2012. LNI , vol.206 , pp. 25-38
    • Schefer-Wenzl, S.1    Strembeck, M.2
  • 33
    • 79960287643 scopus 로고    scopus 로고
    • Modeling Support for Delegating Roles, Tasks, and Duties in a Process-Related RBAC Context
    • In: Salinesi, C., Pastor, O. (eds.), Springer, Heidelberg
    • Schefer, S., Strembeck, M.: Modeling Support for Delegating Roles, Tasks, and Duties in a Process-Related RBAC Context. In: Salinesi, C., Pastor, O. (eds.) CAiSE Workshops 2011. LNBIP, vol. 83, pp. 660-667. Springer, Heidelberg (2011)
    • (2011) CAiSE Workshops 2011. LNBIP , vol.83 , pp. 660-667
    • Schefer, S.1    Strembeck, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.