Object-oriented modeling and design
Object-oriented modeling and design
Communications of the ACM - Special issue on analysis and modeling in software development
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The entity-relationship model—toward a unified view of data
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
Structured Systems Analysis: Tools and Techniques
Structured Systems Analysis: Tools and Techniques
An Execution Model for Multilevel Seccure Workflows
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Towards Security Semantics in Workflow Management
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 7 - Volume 7
Trust for Electronic Commerce Transactions
ADBIS '99 Proceedings of the Third East European Conference on Advances in Databases and Information Systems
A review of information security issues and respective research contributions
ACM SIGMIS Database
International Journal of Electronic Commerce
Document access control in organisational workflows
International Journal of Information and Computer Security
Do secure information system design methods provide adequate modeling support?
Information and Software Technology
CAiSE '09 Proceedings of the 21st International Conference on Advanced Information Systems Engineering
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
On the exploitation of process mining for security audits: the conformance checking case
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Secure by Design: Developing Secure Software Systems from the Ground Up
International Journal of Secure Software Engineering
Hi-index | 0.00 |
Security and integrity are crucial success factors in electronic commerce. This paper offers a framework that includes the security and integrity requirements of business processes in business process execution. An important part of the framework is the modeling and refinement of security and integrity requirements. High-level security requirements of business processes are viewed from five different perspectives. The tasks involved in the different perspectives are described, and the modeling of security requirements is outlined by focusing on the example of the legal binding of contracts.