Current research in risk-aware business process management―overview, comparison, and gap analysis

S Suriadi, B Weiß, A Winkelmann… - … of the Association for …, 2014 - aisel.aisnet.org
The management of risk in business processes has been the subject of active research in
the past few years. Potentially, many benefits can be obtained by integrating the two …

Experimental comparison of attack trees and misuse cases for security threat identification

AL Opdahl, G Sindre - Information and Software Technology, 2009 - Elsevier
A number of methods have been proposed or adapted to include security in the
requirements analysis stage, but the industrial take-up has been limited and there are few …

Modeling process-related RBAC models with extended UML activity models

M Strembeck, J Mendling - Information and Software Technology, 2011 - Elsevier
CONTEXT: Business processes are an important source for the engineering of customized
software systems and are constantly gaining attention in the area of software engineering as …

[图书][B] SOA—Standards & Technology

M Hafner, R Breu - 2009 - Springer
This chapter gives a brief overview of paradigms, technologies and standards that represent
the technical and conceptual foundation of the Sectet-framework. Section 2.1 introduces the …

Mal-activity diagrams for capturing attacks on business processes

G Sindre - … Engineering: Foundation for Software Quality: 13th …, 2007 - Springer
Security is becoming an increasingly important issue for IT systems, yet it is often dealt with
as separate from mainstream systems and software development and in many cases …

[图书][B] Relating system quality and software architecture

I Mistrik, R Bahsoon, P Eeles, R Roshandel, M Stal - 2014 - books.google.com
System Quality and Software Architecture collects state-of-the-art knowledge on how to
intertwine software quality requirements with software architecture and how quality attributes …

A comparison of two approaches to safety analysis based on use cases

T Stålhane, G Sindre - Conceptual Modeling-ER 2007: 26th International …, 2007 - Springer
Engineering has a long tradition in analyzing the safety of mechanical, electrical and
electronic systems. Important methods like HazOp and FMEA have also been adopted by …

Comparing attack trees and misuse cases in an industrial setting

P Karpati, Y Redda, AL Opdahl, G Sindre - Information and Software …, 2014 - Elsevier
The last decade has seen an increasing focus on addressing security already during the
earliest stages of system development, such as requirements determination. Attack trees …

Combined assessment of software safety and security requirements: An industrial evaluation of the CHASSIS method

C Raspotnig, P Karpati, AL Opdahl - Research Anthology on Artificial …, 2021 - igi-global.com
Safety is a fundamental concern in modern society, and security is a precondition for safety.
Ensuring safety and security of complex integrated systems requires a coordinated …

Visualizing cyber attacks with misuse case maps

P Karpati, G Sindre, AL Opdahl - … , REFSQ 2010, Essen, Germany, June 30 …, 2010 - Springer
Abstract [Context and motivation] In the development of secure software, work on
requirements and on architecture need to be closely intertwined, because possible threats …