Analyzing Security Requirements in Timed Workflow Processes.
Yanhua DuYang WangBenyuan YangHesuan HuPublished in: IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
- security requirements
- workflow processes
- smart card
- security policies
- access control
- information security
- security analysis
- business processes
- security properties
- security mechanisms
- software architecture
- petri net
- data mining
- business process
- source code
- database
- workflow management systems
- open source
- virtual enterprise