Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements.
Curtis L. MainesBo ZhouStephen TangQi ShiPublished in: DeSE (2016)
Keyphrases
- security requirements
- security analysis
- smart card
- security properties
- business processes
- information security
- security mechanisms
- software architecture
- security concerns
- security model
- access control
- reference models
- security policies
- security problems
- business process
- mobile commerce
- model driven
- process model
- secure electronic
- information systems
- requirements engineering
- multi agent