2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, 2015
DOI: 10.1109/cit/iucc/dasc/picom.2015.265
|View full text |Cite
|
Sign up to set email alerts
|

A Cyber Security Ontology for BPMN-Security Extensions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 13 publications
0
18
0
Order By: Relevance
“…Modeling security requirements during the design phase of the business processes models is a promising research direction in the field of security engineering [40]. The key idea is to extend graphical business process modeling languages such as BPMN [7] to support the modeling and analysis of security requirements.…”
Section: Bpmn-based Security Engineeringmentioning
confidence: 99%
See 3 more Smart Citations
“…Modeling security requirements during the design phase of the business processes models is a promising research direction in the field of security engineering [40]. The key idea is to extend graphical business process modeling languages such as BPMN [7] to support the modeling and analysis of security requirements.…”
Section: Bpmn-based Security Engineeringmentioning
confidence: 99%
“…Despite the availability of various BPMN-based security extensions [40], support for data-minimization and fairness requirements in business process models is sparse. For dataminimization requirements, we are only aware of the work proposed in [62], which considers one data-minimization requirement, namely anonymity.…”
Section: Bpmn-based Security Engineeringmentioning
confidence: 99%
See 2 more Smart Citations
“…There are also proposed languages for the formulation of security constraints embedded in BPMN [41].…”
Section: Related Workmentioning
confidence: 99%