共 50 条
- [31] Eliciting Security Requirements Method Based on Safety Knowledge Base CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 109 - 121
- [32] A framework for integrating business processes and business requirements EIGHTH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2004, : 9 - 20
- [33] Capturing security requirements in business processes through a UML 2.0 activity diagrams profile ADVANCES IN CONCEPTUAL MODELING - THEORY AND PRACTICE, PROCEEDINGS, 2006, 4231 : 32 - 42
- [34] Flexible and solid business processes as a result of the detachment of Legacy systems by SAP modules STAHL UND EISEN, 2007, 127 (04): : 83 - +
- [35] MARBLE: Modernization Approach for Recovering Business Processes from Legacy Information Systems 2012 28TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE (ICSM), 2012, : 671 - 676
- [36] A business process-based method on security requirements analysis of information systems PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2: MODERN INDUSTRIAL ENGINEERING AND INNOVATION IN ENTERPRISE MANAGEMENT, 2005, : 1005 - 1009
- [37] A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4827 - 4836
- [40] The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 105 - 113