{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:03:15Z","timestamp":1729666995948,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/rcis.2013.6577700","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:29Z","timestamp":1377709889000},"page":"1-10","source":"Crossref","is-referenced-by-count":7,"title":["A taxonomy for assessing security in business process modelling"],"prefix":"10.1109","author":[{"given":"Naved","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Raimundas","family":"Matulevicius","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1995","author":"gamma","key":"19"},{"journal-title":"Security Patterns Integrating Security and Systems Engineering","year":"2005","author":"schumacher","key":"35"},{"key":"17","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/978-3-642-32885-5_24","article-title":"Approximate clone detection in repositories of business process models","volume":"7481","author":"ekanayake","year":"2012","journal-title":"Business Process Management Ser Lecture Notes in Computer Science"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1147\/sj.313.0590"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.1.c6"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.452"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.09.006"},{"journal-title":"Architecting Software with Security Patterns","year":"0","author":"scandariato","key":"34"},{"key":"16","first-page":"450","article-title":"Measuring similarity between business process models","author":"dongen","year":"2008","journal-title":"Proceedings of the 20th International Conference on Advanced Information Systems Engineering Ser CAiSE '08"},{"journal-title":"Threat Modeling Redmond","year":"2004","author":"swiderski","key":"39"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2010.2045777"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/130994.130998"},{"key":"37","first-page":"134","article-title":"Business models and their description","author":"starke","year":"1994","journal-title":"Proceedings of the 9th Austrian-informatics Conference on Workflow Management Challenges Paradigms and Products Ser Con '94"},{"journal-title":"Pattern-Oriented Software Architecture A System of Patterns","year":"1996","author":"buschmann","key":"11"},{"journal-title":"Core Security Patterns Best Practices and Strategies for J2EE Web Services and Identity Management","year":"2006","author":"steel","key":"38"},{"key":"12","first-page":"13","article-title":"Using security patterns to model and analyze security","author":"cheng","year":"2003","journal-title":"IEEE Workshop on Requirements for High Assurance Systems"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.114"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139719773"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1147\/sj.263.0276"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28616-2_7"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905812"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2011.6006844"},{"key":"44","first-page":"62","article-title":"Integrating risks in business process models","author":"zur muehlen","year":"2005","journal-title":"Proceedings of the 2005 Australian Conference on Information Systems (ACIS 2005)"},{"journal-title":"Security Patterns and their Classification Schemes","year":"2006","author":"hafiz","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.2172\/751004"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4483667"},{"journal-title":"Workflow Management Modeling Concepts Architecture and Implementation","year":"1996","author":"jablonski","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.37"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2936-3_3"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601330"},{"journal-title":"Advanced Manufacturing Technology Systems Architectureconstructs for Enterprise Modelling","year":"1995","key":"3"},{"journal-title":"Commission of European Communities","year":"1991","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2000.00075.x"},{"key":"7","first-page":"123","article-title":"A Template of security risk patterns for business processes","author":"ahmed","year":"2011","journal-title":"Perspectives in Business Informatics Research"},{"key":"6","article-title":"Securing business processes using security risk-oriented patterns","author":"ahmed","year":"2013","journal-title":"Accepted at Journal of Computer Standards & Interfaces Elsevier"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2012.6359977"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-5273(03)00102-6"},{"year":"0","key":"31"},{"journal-title":"Patterns and Implementation Guidance for Web Services Enhancements (WSE)","year":"2006","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01982-1_4"},{"key":"8","article-title":"Eliciting security requirements for business processes using patterns","author":"ahmed","year":"2012","journal-title":"WOSIS 2012-Proceedings of the 9th International Workshop on Security in Information Systems"}],"event":{"name":"2013 IEEE Seventh International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2013,5,29]]},"location":"Paris, France","end":{"date-parts":[[2013,5,31]]}},"container-title":["IEEE 7th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571722\/6577671\/06577700.pdf?arnumber=6577700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:53:15Z","timestamp":1498063995000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6577700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/rcis.2013.6577700","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}