1. Ahmed, N., Matulevičius, R.: A method for eliciting security requirements from the business process models. In: CAiSE Forum and Doctoral Consortium 2014, 57–64 (2014)
2. Ahmed, N., Matulevičius, R.: Securing business processes using security risk-oriented patterns. Comput. Stan. Interfaces 36(4), 723–733 (2014)
3. Apostolopoulos, G., Peris, V., Saha, D.: Transport layer security: how much does it really cost? In: Proceedings IEEE INFOCOM 1999 The Conference on Computer Communications, vol. 2, pp. 717–725 (1999)
4. Atluri, V., Warner, J.: Security for workflow systems. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 213–230. Springer, US (2008)
5. Chang, R.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. Commun. Magazine, IEEE 40(10), 42–51 (2002)