2008 Sixth European Conference on Web Services 2008
DOI: 10.1109/ecows.2008.13
|View full text |Cite
|
Sign up to set email alerts
|

Secure Workflow Development from Early Requirements Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…The method of Séguran et al (SHF [26]) was proposed to develop secure workflows (in BPEL2WS) from early requirements analyses (in Secure Tropos). Firstly, several Secure Tropos goal models are designed to capture actors, functional dependencies, authorization and trust issues.…”
Section: Short Overview Of Methodsmentioning
confidence: 99%
“…The method of Séguran et al (SHF [26]) was proposed to develop secure workflows (in BPEL2WS) from early requirements analyses (in Secure Tropos). Firstly, several Secure Tropos goal models are designed to capture actors, functional dependencies, authorization and trust issues.…”
Section: Short Overview Of Methodsmentioning
confidence: 99%
“…Decreus, Snoeck and Poels [30] presented a comparison among six approaches that propose the mapping from i* models to business processes. From this comparison, the authors identified the mapping approach proposed by Séguran, Herbert and Frankova [29] as the only one that maps from the i* Framework to the WS-BPEL/WSDL languages.…”
Section: IIImentioning
confidence: 99%
“…WS&i*-RGPS uses the mapping proposed by Séguran, Herbert and Frankova [29]. Decreus, Snoeck and Poels [30] presented a comparison among six approaches that propose the mapping from i* models to business processes.…”
Section: IIImentioning
confidence: 99%
See 1 more Smart Citation
“…• Frankova et al, 51,52 who propose a method to develop secure business process models based on early requirements analysis. The secure aspects are modeled in the Secure Tropos 53 language, which extends i * /Tropos to support security and trust management policies.…”
Section: Related Workmentioning
confidence: 99%