9. Herrmann, P. and Herrmann, G.; Security requirement analysis of business processes,
Electronic Commerce Research. Vol. 6 (3-4). (2006). pp.305-335.
10. Jacobson, I., Booch, G. and Rumbaugh, J., The Unified Software Development Process,
(1999). 463 p.
11. Jürjens, J.; Using UMLsec and goal trees for secure systems development, Proceedings of
the 2002 ACM Symposium on Applied Computing (SAC). Madrid, Spain. (2002). pp.1026-
1030.
12. Liew, P., Kontogiannis, P. and Tong, T.; A Framework for Business Model Driven
Development, 12 International Workshop on Software Technology and Engineering
Practice (STEP). (2004). pp.47-56.
13. Lopez, J., Montenegro, J. A., Vivas, J. L., Okamoto, E. and Dawson, E.; Specification and
design of advanced authentication and authorization services, Computer Standards &
Interfaces. Vol. 27 (5). (2005). pp.467-478.
14. Maña, A., Montenegro, J. A., Rudolph, C. and Vivas, J. L.; A business process-driven
approach to security engineering, 14th. International Workshop on Database and Expert
Systems Applications (DEXA). Prague, Czech Republic. (2003). pp.477-481.
15. Monfort, V. and Kadima, H.; Extending The Unified Process With Composition, Electronic
Notes in Theoretical Computer Science. Vol. 65 (4). (2002). pp.1-13.
16. Object Management Group; MDA Guide Version 1.0.1. In
http://www.omg.org/docs/omg/03-06-01.pdf. (2003).
17. Quirchmayr, G.; Survivability and Business Continuity Management, ACSW Frontiers
2004 Workshops. Dunedin, New Zealand. (2004). pp.3-6.
18. QVT, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG
Adopted Specification ptc/05-11-01, (2005). 204 p.
19. Rodríguez, A., Fernández-Medina, E. and Piattini, M.; Towards a UML 2.0 Extension for
the Modeling of Security Requirements in Business Processes, 3rd International Conference
on Trust, Privacy and Security in Digital Business (TrustBus). Vol. 4083. Krakow-Poland.
(2006). pp.51-61.
20. Röhm, A. W., Pernul, G. and Herrmann, G.; Modelling Secure and Fair Electronic
Commerce, 14th. Annual Computer Security Applications Conference. Scottsdale, Arizona.
(1998). pp.155-164.
21. Roser, S. and Bauer, B.; A Categorization of Collaborative Business Process Modeling
Techniques, 7th IEEE International Conference on E-Commerce Technology Workshops
(CEC 2005). Munchen, Germany. (2005). pp.43-54.
22. Rungworawut, W. and Senivongse, T.; A Guideline to Mapping Business Processes to
UML Class Diagrams, WSEAS Transactions on Computers. Vol. 4 (11). (2005). pp.1526-
1533.
23. Sindre, G. and Opdahl, A.; Capturing Security Requirements through Misuse Cases,
Proceedings of Norsk informatikkonferanse (NIK). Trondheim, Norway. (2001). pp.219-
230.
24. Štolfa, S. and Vondrák, I.; A Description of Business Process Modeling as a Tool for
Definition of Requirements Specification, Systems Integration 12th Annual International
Conference. Prague, Czech Republic. (2004). pp.463-469.
25. Vivas, J. L., Montenegro, J. A. and Lopez, J.; Towards a Business Process-Driven
Framework for security Engineering with the UML, Information Security: 6th International
Conference, ISC. Bristol, U.K. (2003). pp.381-395.
219