Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
Raimundas MatuleviciusNaved AhmedPublished in: it Inf. Technol. (2013)
Keyphrases
- business processes
- security requirements
- reference models
- security risks
- business process
- information security
- smart card
- access control
- web services
- workflow management systems
- software architecture
- security policies
- security mechanisms
- process model
- business process management
- business partners
- data mining techniques
- information systems
- network security
- object oriented
- wireless sensor networks
- case study