Eliciting Security Requirements for Business Processes using Patterns

Ahmed, N.; Matulevicius, R.; Khan, N. H. (2012). Eliciting Security Requirements for Business Processes using Patterns. In: Rosado, D. G.; Crespo, L. E. S.; Blanco, C.; Jurjens, J. (Ed.). Security in Information Systems (49−58). SciTePress. (Proceedings of WOSIS 2012, 9th International Workshop on Security in Information Systems, in conjunction with ICEIS 2012).
kogumikuartikkel/peatükk raamatus/kogumikus
Ahmed, N.; Matulevicius, R.; Khan, N. H.
  • Inglise
Eliciting Security Requirements for Business Processes using Patterns
Security in Information Systems
Rosado, D. G.; Crespo, L. E. S.; Blanco, C.; Jurjens, J.
SciTePress
978-989-8565-15-0
Proceedings of WOSIS 2012, 9th International Workshop on Security in Information Systems, in conjunction with ICEIS 2012
2012
4958
Ilmunud
3.1. Artiklid/peatükid lisas loetletud kirjastuste välja antud kogumikes (kaasa arvatud Thomson Reuters Book Citation Index, Thomson Reuters Conference Proceedings Citation Index, Scopus refereeritud kogumikud)

Viited terviktekstile

Seotud asutused

Lisainfo

Conference Paper From http://www.iceis.org/WOSIS.aspx?y=2012 :: All accepted papers (full, short and posters) will be published in a special section of the conference proceedings book - under an ISBN reference and on CD-ROM support - and submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index). All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).