共 50 条
- [1] Security requirement with a UML 2.0 profile [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 670 - +
- [3] Capturing security requirements in business processes through a UML 2.0 activity diagrams profile [J]. ADVANCES IN CONCEPTUAL MODELING - THEORY AND PRACTICE, PROCEEDINGS, 2006, 4231 : 32 - 42
- [4] A UML 2.0/OCL extension for designing secure data warehouses [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2006, 38 (01): : 31 - 43
- [5] Integration of Spatial Networks in Data Warehouses: A UML Profile [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2013, PT IV, 2013, 7974 : 253 - 267
- [7] Towards a UML 2.0 extension for the modeling of security requirements in business processes [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 51 - 61
- [8] CIM for data warehouse requirements using an UML profile [J]. IET SOFTWARE, 2017, 11 (04) : 181 - 194