References
1. Common attack pattern enumeration and classification, available at http://capec.mitre.org/
data/definitions/94.html
2. DCSSL EBIOS expression of needs and identification of security objectives (2004), avail-
able at http://www.bsi.de/english/gshb/manual/download/index.html
3. ENISA -inventory of risk assessment and risk management methods (2004)
4. Ahmed, N., Matulevi
ˇ
cius, R.: A template of security risk patterns for business processes. In:
Perspectives in Business Informatics Research, Riga, Latvia. pp. 123–130. Riga Technical
University (2011)
5. Altuhhova, O., Matulevi
ˇ
cius, R., Ahmed, N.: Towards Definition of Secure Business Pro-
cesses. In: M. Bajec and J. Eder (Eds.): CAiSE 2012 Workshops, LNBIP 112. pp. 1–15.
Springer-Verlag (2012)
6. Braber, F., Hogganvik, I., Lund, M. S., Stølen, K., Vraalsen, F.: Model-based security analy-
sis in seven steps — a guided tour to the coras method. BT Technology Journal 25, 101–117
(2007)
7. Devanbu, P. T., Stubblebine, S.: Software engineering for security: a roadmap. In: The Future
of Software Engineering. pp. 227–239. ACM Press (2000)
8. Dubois, E., Heymans, P., Mayer, N.and Matuleviv¸ius, R.: A systematic approach to define
the domain of information system security risk management. In: Intentional Perspectives on
IS Engg., pp. 289–306. Springer (2010)
9. Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security trade-offs.
Security 4801(7), 375–390 (2007)
10. Firesmith, D.: Engineering safety and security related requirements for software intensive
systems. In: Software Engineering - Companion. ICSE 2007 Companion. 29th International
Conference on. p. 169. IEEE Computer Society (2007)
11. J
¨
urjens, J.: Secure systems development with UML. Springer (2005)
12. Khan, N. H., Ahmed, N., Matulevi
ˇ
cius, R.: Security Risk Oriented Patterns. Tech. rep.,
University of Tartu, Department of Computer Sciences (04 2012), http://www.cs.ut.ee/
∼naved/Security Risk Oriented Patterns.pdf
13. Paja, E., Giorgini, P., Paul, S., Meland, P. H.: Security requirements engineering for business
processes. In: Perspectives in Business Informatics Research, Riga, Latvia. pp. 163–170.
Riga Technical University (2011)
14. Pavlovski, C. J., Zou, J.: Non-functional requirements in business process modeling. In: Pro-
ceedings of the 5th Asia-Pacific conf. on Conceptual Modelling. pp. 103–112. APCCM,
Australian Computer Society, Inc. (2008)
15. Rodr
´
ıguez, A., Fern
´
andez-Medina, E., Piattini, M.: A bpmn extension for the modeling of se-
curity requirements in business processes. IEICE - Trans. Inf. Syst. 90-D(4), 745–752 (2007)
16. R
¨
ohrig, S., Knorr, K.: Security analysis of electronic business processes. Electronic Com-
merce Research 4(1-2), 59–81 (2004)
17. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.:
Security Patterns: Integrating Security and Systems Engineering (2006)
18. Tsipenyuk, K., Chess, B., McGraw, G.: Seven pernicious kingdoms: A taxonomy of software
security errors. IEEE Security & Privacy 3(6), 81–84 (2005)
58