11 Firesmith, D.; Specifying Reusable Security Requirements, Journal of Object Technology
Vol. 3, Nº 1,January-February 2004. (2004). p:61-75.
12 Ghalimi, I.; BPMN vs. UML. In
http://www.intalio.com/education/notes/note.xpg?id=BPMN_vs_UML. (2002).
13 Giaglis, G. M.; A Taxonomy of Business Process Modelling and Information Systems
Modelling Techniques, International Journal of Flexible Manufacturing Systems Vol. 13
(2). (2001). p:209-228.
14 Herrmann, G. and Pernul, G.; Viewing Business Process Security from Different
Perspectives, Proceedings of 11th International Bled Electronic Commerce Conference
"Electronic Commerce in the Information Society". Slovenia. (1998). p:89-103.
15 Hung, P. and Karlapalem, K.; A Secure Workflow Model, Australasian Information Security
Workshop (AISW2003). Vol. 21. Adelaide, Australia. (2003). p:33-41.
16 Jürjens, J., Secure Systems Development with UML, Springer Verlag, (2004). 309 p.
17 Lodderstedt, T., Basin, D. and Doser, J.; SecureUML: A UML-Based Modeling Language
for Model-Driven Security, UML 2002 - The Unified Modeling Language, 5th International
Conference. Vol. 2460. Dresden, Germany. (2002). p:426-441.
18 Maña, A., Montenegro, J. A., Rudolph, C. and Vivas, J. L.; A business process-driven
approach to security engineering, 14th. International Workshop on Database and Expert
Systems Applications (DEXA). Prague, Czech Republic. (2003). p:477-481.
19 Mega; Business process Modeling and Standardization. In
http://www.bpmg.org/downloads/Articles/Article-MEGA-
BusinessProcessModeling&StandardizationEN.pdf. (2004).
20 Nuseibeh, B. and Easterbrook, S. M.; Requirements Engineering: A Roadmap, ICSE 2000,
22nd International Conference on on Software Engineering, Future of Software
Engineering Track. Limerick Ireland. ACM. (2000). p:35-46.
21 OMG; Object Management Group. In http://www.omg.org/. (2004).
22 Owen, M. and Raj, J.; BPMN and Business Process Management; Introduction to the New
Business Process Modeling Standard, A Popkin Software, W. P. In
http://www.bpmn.org/Documents/6AD5D16960.BPMN_and_BPM.pdf. (2003).
23 Palkovits, S., Rössler, T. and Wimmer, M.; Process Modelling - Burden or Relief? Living
Process Modelling within a Public Organisation, ICEIS 2004, Proceedings of the 6th
International Conference on Enterprise Information Systems. Porto, Portugal. (2004). p:94-
102.
24 Reijers, H. A.; Business Process Management Attempted Concepticide?, IRMA
International Conference (2004). p:128-131.
25 Röhm, A. W., Herrmann, G. and Pernul, G.; A Language for Modelling Secure Business
Transactions, Proceedings 15th. Annual Computer Security Applications Conference.
Computer Society Press., Phoenix, Arizona. (1999). p:22-31.
26 Sandhu, R. and Samarati, P.; Authentication, Access Control, and Audit, ACM Computing
Surveys Vol. 28 Nº1 March 1996. (1996). p:241-243.
27 Sparks, G.; An Introduction to UML, The Business Process Model. In
http://www.sparxsystems.com.au/WhitePapers/The_Business_Process_Model.pdf. (2000).
28 Tryfonas, T. and Kiountouzis, E. A.; Perceptions of Security Contributing to the
Implementation of Secure IS, Security and Privacy in the Age of Uncertainty, IFIP TC11
18th International Conference on Information Security (SEC2003) Vol. 250. Athens,
Greece. (2003). p:313-324.
29 W.M.P. van der Aalst, Hofstede, A. H. M. t. and Weske, M.; Business Process
Management: A Survey, International Conference on Business Process Management (BPM
2003) Volume 2678 (LNCS). Eindhoven, The Netherlands. (2003). p:1-12.
30 WfMC, Workflow Management Coalition: Terminology & Glossary., Document Number
WFMC-TC-1011, Document Number WFMC-TC-1011, (1999). 65 p.
31 White, S. A.; Introduction to BPMN. In http://www.ebpml.org/bpmn.htm. (2004).
297