共 50 条
- [1] Security Requirements Elicitation from Business Processes [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
- [2] Security requirements of E-business processes [J]. TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 73 - 86
- [4] Engineering secure software by modelling privacy and security requirements [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
- [5] Modeling Security Requirements in Service Based Business Processes [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 76 - 90
- [6] Eliciting Security Requirements for Business Processes of Legacy Systems [J]. PRACTICE OF ENTERPRISE MODELING, POEM 2015, 2015, 235 : 91 - 107
- [8] Incorporating Security Requirements Engineering into Standard Lifecycle Processes [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (04): : 67 - 79
- [9] Secure Information Systems development -: Based on a security requirements engineering process [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 467 - +
- [10] Supporting Security Requirements Engineering Through the Devolpmemt of the secure devolopmemt Ontology [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2022), 2022, : 151 - 158