Business process modelling challenges and solutions: a literature review

Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …

Survey of business process management: challenges and solutions

Y Alotaibi, F Liu - Enterprise Information Systems, 2017 - Taylor & Francis
The current literature shows that creating a good framework on business process model
(PM) is not an easy task. A successful business PM should have the ability to ensure …

The wave kernel signature: A quantum mechanical approach to shape analysis

M Aubry, U Schlickewei… - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
We introduce the Wave Kernel Signature (WKS) for characterizing points on non-rigid three-
dimensional shapes. The WKS represents the average probability of measuring a quantum …

UMLsec: Extending UML for secure systems development

J Jürjens - International Conference on The Unified Modeling …, 2002 - Springer
Develo** secure-critical systems is difficult and there are many well-known examples of
security weaknesses exploitedin practice. Thus a sound methodology supporting secure …

SecureUML: A UML-based modeling language for model-driven security

T Lodderstedt, D Basin, J Doser - International Conference on the Unified …, 2002 - Springer
We present a modeling language for the model-driven development of secure, distributed
systems based on the Unified Modeling Language (UML). Our approach is based on role …

[BOK][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

Model driven security: From UML models to access control infrastructures

D Basin, J Doser, T Lodderstedt - ACM Transactions on Software …, 2006 - dl.acm.org
We present a new approach to building secure systems. In our approach, which we call
Model Driven Security, designers specify system models along with their security …

A BPMN extension for the modeling of security requirements in business processes

A Rodríguez, E Fernández-Medina… - IEICE transactions on …, 2007 - search.ieice.org
Business Processes are considered a crucial issue by many enterprises because they are
the key to maintain competitiveness. Moreover, business processes are important for …

[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach

PX Mai, A Goknil, LK Shar, F Pastore, LC Briand… - Information and …, 2018 - Elsevier
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …

Automated analysis of security-design models

D Basin, M Clavel, J Doser, M Egea - Information and Software Technology, 2009 - Elsevier
We have previously proposed SecureUML, an expressive UML-based language for
constructing security-design models, which are models that combine design specifications …