共 50 条
- [31] Applying a security requirements engineering process COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
- [32] Research on Security Requirements Engineering Process 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 1285 - 1288
- [33] A Framework for Security Design Engineering Process COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 287 - +
- [34] Guiding the application of design patterns based on UML models ICSM 2006: 22ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2006, : 234 - +
- [35] A process framework for characterising security properties of component-based software systems 2004 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 358 - 367
- [36] Application of Component-Based Software Engineering in Building a Surveillance Robot PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 651 - 658
- [37] An Application Security Model Based on Business Process in Information System 2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
- [38] Framework for Engineering Complex Security Requirements Patterns 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
- [39] Requirements Engineering Based on Business Process Models: A Case Study 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, : 320 - 327
- [40] Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 3, 2013, : 382 - 387