共 50 条
- [41] Timed Analysis of Security Protocols INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
- [42] Timed Automata Semantics for Analyzing Creol ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2010, (30): : 108 - 122
- [45] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230
- [46] Practical experiences and requirements on workflow COORDINATION TECHNOLOGY FOR COLLABORATIVE APPLICATIONS: ORGANIZATIONS, PROCESSES, AND AGENTS, 1998, 1364 : 145 - 160
- [47] Timed Automaton RVT-Grammar for Workflow Translating ADVANCES IN COMPUTATIONAL INTELLIGENCE, MICAI 2018, PT II, 2018, 11289 : 146 - 155
- [48] Towards a UML 2.0 extension for the modeling of security requirements in business processes TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 51 - 61
- [50] Presentation and Validation of Method for Security Requirements Elicitation from Business Processes INFORMATION SYSTEMS ENGINEERING IN COMPLEX ENVIRONMENTS, 2015, 204 : 20 - 35