Author:
Argyropoulos Nikolaos,Mouratidis Haralambos,Fish Andrew
Publisher
Springer International Publishing
Reference33 articles.
1. Mellado, D., Fernández-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stan. Interfaces 29(2), 244–253 (2007)
2. Lecture Notes in Business Information Processing;O Altuhhova,2012
3. Leitner, M., Miller, M., Rinderle-Ma, S.: An Analysis and evaluation of security aspects in the business process model and notation. In: 2013 IEEE International Conference on Availability, Reliability and Security. IEEE Press, pp. 262–267 (2013)
4. Neubauer, T., Klemen, M., Biffl, S.: Secure business process management: a roadmap. In: 1st IEEE International Conference on Availability, Reliability and Security, Vienna, Austria. IEEE Press, pp. 457–464 (2006)
5. Pavlovski, C.J., Zou, J.: Non-functional requirements in business process modeling. In: 5th Asia-Pacific Conference on Conceptual Modelling, vol. 79, Wollongong, Australia, pp. 103–112 (2008)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing secure business process design with security process patterns;Software and Systems Modeling;2019-07-13
2. Consistency Verification between Collaborative Business Processes and Requirements;2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData);2019-07
3. Goal Modelling for Security Problem Matching and Pattern Enforcement;International Journal of Secure Software Engineering;2017-07
4. Supporting Secure Business Process Design via Security Process Patterns;Enterprise, Business-Process and Information Systems Modeling;2017
5. Security Alignment Analysis of Software Product Lines;2016 4th International Conference on Enterprise Systems (ES);2016-11