References
1. Artelsmair, C. and Wagner, R.; Towards a Security Engineering Process, The 7th World
Multiconference on Systemics, Cybernetics and Informatics. Vol. VI. Orlando, Florida,
USA. (2003). pp.22-27.
2. Atluri, V.; Security for Workflow Systems, Information Security Technical Report. Vol. 6
(2). (2001). pp.59-68.
3. Backes, M., Pfitzmann, B. and Waider, M.; Security in Business Process Engineering,
International Conference on Business Process Management. Vol. 2678, LNCS. Eindhoven,
The Netherlands. (2003). pp.168-183.
4. Bertino, E.; RBAC models – concepts and trends, Computers and Security. Vol. 22 (6).
(2003). pp.511-514.
5. Bertino, E., Ferrari, E. and Atluri, V.; A Flexible model Supporting the Specification and
Enforcement of Role-Based Authorizations in Workflow Management Systems, Second
ACM Workshop on Role-Based Access Control, Fairfax (Virginia). (1997). pp.1-12.
6. Bock, C.; UML 2 Activity and Action Models, Journal of Object Technology. Vol. 2 (4),
July-August. (2003). pp.43-53.
7. Bock, C.; UML 2 Activity and Action Models, Part 2: Actions, Journal of Object
Technology. Vol. 2 (5), September-October. (2003). pp.41-56.
8. Botha, R. A. and Eloff, J. H. P.; A framework for access control in workflow systems,
Information Management & Computer Security. Vol. 9/3. (2001). pp.126-133.
9. Caetano, A., Rito Silva, A. and Tribolet, J.; Business Process Modeling with Objects and
Roles, 6th International Conference on Enterprise Information Systems (ICEIS 2004).
Porto, Portugal. (2004). pp.109-114.
10. Caetano, A., Zacarias, M., Rito Silva, A. and Tribolet, J.; A Role-Based Framework for
Business Process Modeling, 38th Hawaii International Conference on System Sciences
(HICSS-38 2005). Big Island, HI, USA. (2005). pp.130-136.
11. Eriksson, H.-E. and Penker, M., Business Modeling with UML, OMG Press. (2001).
12. Ferraiolo, D. F., Sandhu, R., Gavrila, S. I., Kuhn, D. R. and Chandramouli, R.; Proposed
NIST standard for role-based access control, ACM Transactions on Information and
System Security (TISSEC). Vol. 4 (3). (2001). pp.224-274.
13. Firesmith, D.; Engineering Security Requirements, Journal of Object Technology. Vol. 2
(1), January-February. (2003). pp.53-68.
14. Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology.
Vol. 3 (1), January-February. (2004). pp.61-75.
15. Giaglis, G. M.; A Taxonomy of Business Process Modelling and Information Systems
Modelling Techniques, International Journal of Flexible Manufacturing Systems. Vol. 13
(2). (2001). pp.209-228.
16. Herrmann, G. and Pernul, G.; Viewing Business Process Security from Different
Perspectives, 11th International Bled Electronic Commerce Conference. Slovenia. (1998).
pp.89-103.
17. Kalnins, A., Barzdins, J. and Celms, E.; UML Business Modeling Profile, Thirteenth
International Conference on Information Systems Development, Advances in Theory,
Practice and Education. Vilnius, Lithuania. (2004). pp.182-194.
18. List, B. and Korherr, B.; A UML 2 Profile for Business Process Modelling, 1st
International Workshop on Best Practices of UML (BP-UML 2005) at ER-2005.
Klagenfurt, Austria. (2005).
19. Liu, P. and Chen, Z.; An Extended RBAC Model for Web Services in Business Process,
IEEE International Conference on E-Commerce Technology for Dynamic E-Business
(CEC-East'04). (2004). pp.100-107.
20. Lodderstedt, T., Basin, D. and Doser, J.; SecureUML: A UML-Based Modeling Language
for Model-Driven Security, UML 2002 - The Unified Modeling Language, 5th International
Conference. Vol. 2460. Dresden, Germany. (2002). pp.426-441.
183