Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

An extensive systematic review on the model-driven development of secure systems

PH Nguyen, M Kramer, J Klein, Y Le Traon - Information and Software …, 2015 - Elsevier
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …

Route skyline queries: A multi-preference path planning approach

HP Kriegel, M Renz, M Schubert - 2010 IEEE 26th International …, 2010 - ieeexplore.ieee.org
In recent years, the research community introduced various methods for processing skyline
queries in multidimensional databases. The skyline operator retrieves all objects being …

Extending access control models with break-glass

AD Brucker, H Petritsch - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …

Business process modelling challenges and solutions: a literature review

Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …

A decade of model-driven security

D Basin, M Clavel, M Egea - Proceedings of the 16th ACM symposium …, 2011 - dl.acm.org
In model-driven development, system designs are specified using graphical modeling
languages like UML and system artifacts such as code and configuration data are …

Survey of business process management: challenges and solutions

Y Alotaibi, F Liu - Enterprise Information Systems, 2017 - Taylor & Francis
The current literature shows that creating a good framework on business process model
(PM) is not an easy task. A successful business PM should have the ability to ensure …

Architectural attack propagation analysis for identifying confidentiality issues

M Walter, R Heinrich… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …

Automatically extracting threats from extended data flow diagrams

BJ Berger, K Sohr, R Koschke - … , ESSoS 2016, London, UK, April 6–8 …, 2016 - Springer
Architectural risk analysis is an important aspect of develo** software that is free of
security flaws. Knowledge on architectural flaws, however, is sparse, in particular in small or …

Design notations for secure software: a systematic literature review

A Van den Berghe, R Scandariato, K Yskout… - Software & Systems …, 2017 - Springer
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …