Security and privacy requirements for the internet of things: A survey
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
An extensive systematic review on the model-driven development of secure systems
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …
Engineering research area for supporting the development of secure systems. Over a …
Route skyline queries: A multi-preference path planning approach
In recent years, the research community introduced various methods for processing skyline
queries in multidimensional databases. The skyline operator retrieves all objects being …
queries in multidimensional databases. The skyline operator retrieves all objects being …
Extending access control models with break-glass
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …
only changes seldom. Especially for scenarios in health care and disaster management, a …
Business process modelling challenges and solutions: a literature review
Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
A decade of model-driven security
In model-driven development, system designs are specified using graphical modeling
languages like UML and system artifacts such as code and configuration data are …
languages like UML and system artifacts such as code and configuration data are …
Survey of business process management: challenges and solutions
The current literature shows that creating a good framework on business process model
(PM) is not an easy task. A successful business PM should have the ability to ensure …
(PM) is not an easy task. A successful business PM should have the ability to ensure …
Architectural attack propagation analysis for identifying confidentiality issues
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
Automatically extracting threats from extended data flow diagrams
Architectural risk analysis is an important aspect of develo** software that is free of
security flaws. Knowledge on architectural flaws, however, is sparse, in particular in small or …
security flaws. Knowledge on architectural flaws, however, is sparse, in particular in small or …
Design notations for secure software: a systematic literature review
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …
notations to represent security properties and concepts in a design artifact. These notations …