Eliciting Security Requirements for Business Processes of Legacy Systems.
Nikolaos ArgyropoulosLuis Márquez AlcañizHaralambos MouratidisAndrew FishDavid G. RosadoIgnacio García Rodríguez de GuzmánEduardo Fernández-MedinaPublished in: PoEM (2015)
Keyphrases
- business processes
- legacy systems
- security requirements
- business process
- business rules
- smart card
- information security
- reference models
- security policies
- access control
- security mechanisms
- web services
- process model
- software architecture
- requirements engineering
- workflow management systems
- goal oriented
- information systems
- network security
- service oriented architecture
- fine grained
- access control policies
- e government
- database