共 50 条
- [1] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns [J]. IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230
- [2] Security Requirements Elicitation from Business Processes [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
- [3] Security requirements of E-business processes [J]. TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 73 - 86
- [4] Security Requirements Engineering for Secure Business Processes [J]. WORKSHOPS ON BUSINESS INFORMATICS RESEARCH, 2012, 106 : 77 - +
- [7] A Systems Approach for Eliciting Mission-Centric Security Requirements [J]. 12TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2018), 2018, : 626 - 633
- [8] Modeling Security Requirements in Service Based Business Processes [J]. ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 76 - 90
- [10] Aligning legacy information systems to business processes [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, 1998, 1413 : 25 - 39