共 27 条
- [1] (2014)
- [2] Anderson R., Security Engineering: A Guide to Building Dependable Distributed Systems, (2008)
- [3] Beeri C., Eyal A., Kamenkovich S., Milo T., Querying business processes with BP-QL, Inf. Syst, 33, 6, pp. 477-507, (2008)
- [4] Brucker A.D., Hang I., Luckemeyer G., Ruparel R., SecureBPMN: Modeling and enforcing access control requirements in business processes, Proceedings of SACMAT’12, pp. 123-126, (2012)
- [5] Cherdantseva Y., Hilton J., A reference model of information assurance and security, Proceedings of ARES ’13, pp. 546-555, (2013)
- [6] Crook R., Ince D., Lin L., Nuseibeh B., Security requirements engineering: When anti-requirements hit the fan, Proceedings of RE’02, pp. 203-205, (2002)
- [7] Dalpiaz F., Paja E., Giorgini P., Security requirements engineering via commitments, Proceedings of STAST’11, pp. 1-8, (2011)
- [8] Deutch D., Milo T., Querying structural and behavioral properties of business processes, DBPL 2007. LNCS,, 4797, pp. 169-185, (2007)
- [9] Ghose A.K., Koliadis G., Auditing business process compliance, ICSOC 2007. LNCS, 4749, pp. 169-180, (2007)
- [10] Giorgini P., Massacci F., Mylopoulos J., Zannone N., Modeling security requirements through ownership, permission and delegation, Proceedings of RE’05, pp. 167-176, (2005)