共 43 条
- [1] Ahmed N(2014)Securing business processes using security risk-oriented patterns Comput. Stand. Interfaces 36 723-733
- [2] Matulevičius R(2015)Spider graphs: a graph transformation system for spider diagrams Softw. Syst. Modell. 14 1421-1453
- [3] Bottoni P(2004)Tropos: an agent-oriented software development methodology Auton. Agents Multi-Agent Syst. 8 203-236
- [4] Fish A(2010)Policy-enabled goal-oriented requirements engineering for semantic business process management Int. J. Intell. Syst. 25 784-812
- [5] Parisi-Presicce F(2010)Guest editorial: security requirements engineering: past, present and future Requir Eng 15 1-5
- [6] Bresciani P(2008)Addressing privacy requirements in system design: the pris method Requir. Eng. 13 241-255
- [7] Perini A(2007)Secure tropos: a security-oriented extension of the tropos methodology Int. J. Softw. Eng. Knowl. Eng. 17 285-309
- [8] Giorgini P(2006)Modeling secure systems using an agent-oriented approach and security patterns Int. J. Softw. Eng. Knowl. Eng. 16 471-498
- [9] Giunchiglia F(2006)Security patterns and requirements for internet-based applications Internet Res. 16 519-536
- [10] Mylopoulos J(2016)Designing secure business processes with SecBPMN Softw. Syst. Model. 16 737-757