共 50 条
- [1] BYOD Security: A New Business Challenge [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1128 - 1133
- [2] Enhancing secure business process design with security process patterns [J]. Software and Systems Modeling, 2020, 19 : 555 - 577
- [3] Enhancing secure business process design with security process patterns [J]. SOFTWARE AND SYSTEMS MODELING, 2020, 19 (03): : 555 - 577
- [4] Supporting Secure Business Process Design via Security Process Patterns [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2017 AND EMMSAD 2017, 2017, 287 : 19 - 33
- [6] A Voucher-Based Security Middleware for Secure Business Process Outsourcing [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017, 2017, 10379 : 19 - 35
- [7] Managing Security and Privacy Integration across Enterprise Business Process and Infrastructure [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 351 - 358
- [8] From Secure Business Process Modeling to Design-Level Security Verification [J]. 2017 ACM/IEEE 20TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2017), 2017, : 123 - 133
- [9] Security in business process management [J]. Accorsi, Rafael (raccorsi@acm.org), 2013, De Gruyter Oldenbourg (55):
- [10] Security in business process engineering [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2003, 2678 : 168 - 183