Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann… - … of the Association for …, 2014 - aisel.aisnet.org
The management of risk in business processes has been the subject of active research in
the past few years. Potentially, many benefits can be obtained by integrating the two …
the past few years. Potentially, many benefits can be obtained by integrating the two …
Experimental comparison of attack trees and misuse cases for security threat identification
A number of methods have been proposed or adapted to include security in the
requirements analysis stage, but the industrial take-up has been limited and there are few …
requirements analysis stage, but the industrial take-up has been limited and there are few …
Modeling process-related RBAC models with extended UML activity models
M Strembeck, J Mendling - Information and Software Technology, 2011 - Elsevier
CONTEXT: Business processes are an important source for the engineering of customized
software systems and are constantly gaining attention in the area of software engineering as …
software systems and are constantly gaining attention in the area of software engineering as …
[图书][B] SOA—Standards & Technology
M Hafner, R Breu - 2009 - Springer
This chapter gives a brief overview of paradigms, technologies and standards that represent
the technical and conceptual foundation of the Sectet-framework. Section 2.1 introduces the …
the technical and conceptual foundation of the Sectet-framework. Section 2.1 introduces the …
Mal-activity diagrams for capturing attacks on business processes
G Sindre - … Engineering: Foundation for Software Quality: 13th …, 2007 - Springer
Security is becoming an increasingly important issue for IT systems, yet it is often dealt with
as separate from mainstream systems and software development and in many cases …
as separate from mainstream systems and software development and in many cases …
[图书][B] Relating system quality and software architecture
I Mistrik, R Bahsoon, P Eeles, R Roshandel, M Stal - 2014 - books.google.com
System Quality and Software Architecture collects state-of-the-art knowledge on how to
intertwine software quality requirements with software architecture and how quality attributes …
intertwine software quality requirements with software architecture and how quality attributes …
A comparison of two approaches to safety analysis based on use cases
T Stålhane, G Sindre - Conceptual Modeling-ER 2007: 26th International …, 2007 - Springer
Engineering has a long tradition in analyzing the safety of mechanical, electrical and
electronic systems. Important methods like HazOp and FMEA have also been adopted by …
electronic systems. Important methods like HazOp and FMEA have also been adopted by …
Comparing attack trees and misuse cases in an industrial setting
The last decade has seen an increasing focus on addressing security already during the
earliest stages of system development, such as requirements determination. Attack trees …
earliest stages of system development, such as requirements determination. Attack trees …
Combined assessment of software safety and security requirements: An industrial evaluation of the CHASSIS method
C Raspotnig, P Karpati, AL Opdahl - Research Anthology on Artificial …, 2021 - igi-global.com
Safety is a fundamental concern in modern society, and security is a precondition for safety.
Ensuring safety and security of complex integrated systems requires a coordinated …
Ensuring safety and security of complex integrated systems requires a coordinated …
Visualizing cyber attacks with misuse case maps
Abstract [Context and motivation] In the development of secure software, work on
requirements and on architecture need to be closely intertwined, because possible threats …
requirements and on architecture need to be closely intertwined, because possible threats …