Resolving vulnerability identification errors using security requirements on business process models.
Stefan TaubenbergerJan JürjensYijun YuBashar NuseibehPublished in: Inf. Manag. Comput. Secur. (2013)
Keyphrases
- security requirements
- business process models
- business process
- smart card
- security analysis
- business processes
- security properties
- information security
- access control
- security problems
- software architecture
- security mechanisms
- security policies
- process model
- requirements engineering
- secure electronic
- security patterns
- development lifecycle
- control flow
- fine grained
- security protocols
- distributed systems
- case study