This blog is concerned with Information Security and Business process management, and the integration of Security with BPM.
Friday, 16 April 2010
Papers fully read and Catigorized ..
This is a list of papers that i have done reading, categorizing, and summarizing.
------------------------------------
Paper title: A BPMN Extension for the Modeling of Security Requirements in Business Processes.
Author(s): Alfonso RODR´IGUEZ, Eduardo FERN´ANDEZ-MEDINA, and Mario PIATTINI.
Category:integrating Security Requirements into BPM (Modeling Notation extension).
Date finished reading:26-4-2010
Paper title: Model-driven business process security requirement specification.
Author(s): Christian Wolter , Michael Menzel , Andreas Schaad , Philip Miseldine , Christoph Meinel.
Category:integrating Security Requirements into BPM (modeling to execution).
Date finished reading:24-4-2010
Paper title: A Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints
Author(s): Basit Shafiq, Arjmand Samuel, Elisa Bertino, and Arif Ghafoor
Category:integrating Security Requirements into BPM (Formal)
Date finished reading:18-4-2010
Paper title: Secure Business Process Management: A Roadmap.
Author(s): Thomas Neubauer, Markus Klemen, Stefan Biffl
Category: Overview
Date finished reading:15-4-2010
Paper title: Security for Workflow Systems.
Author(s): Vijay Atluri, Rutgers University
Category: Overview
Date finished reading: 11-4-2010
Paper title: BPM & Security.
Author(s): BPMInstitute.org
Category: Overview
Date finished reading: 9-4-2010
Paper title: Privacy-Aware Workflow Management.
Author(s): Bandar Alhaqbani, Michael Adams, Colin Fidge, and Arthur H.M. ter Hofstede
Category: integrating Security requirements in BPM (Privacy).
Date finished reading: 5-4-2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment