Social Modeling and i*
ES Yu - … modeling: Foundations and applications: Essays in …, 2009 - Springer
Many different types of models are used in various scientific and engineering fields,
reflecting the subject matter and the kinds of understanding that is sought in each field …
reflecting the subject matter and the kinds of understanding that is sought in each field …
Survey on access control for community-centered collaborative systems
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …
collaborative systems and platforms. These systems and platforms aim to provide an …
[HTML][HTML] STORE: Security threat oriented requirements engineering methodology
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …
electronic channels and software applications for our business, online transaction and …
Business process modelling challenges and solutions: a literature review
Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
Reusable knowledge in security requirements engineering: a systematic map** study
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …
system development. Over the last two decades, researchers and engineers have …
Survey of business process management: challenges and solutions
The current literature shows that creating a good framework on business process model
(PM) is not an easy task. A successful business PM should have the ability to ensure …
(PM) is not an easy task. A successful business PM should have the ability to ensure …
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
Many security breaches occur because of exploitation of vulnerabilities within the system.
Vulnerabilities are weaknesses in the requirements, design, and implementation, which …
Vulnerabilities are weaknesses in the requirements, design, and implementation, which …
Operationalizing human values in software engineering: A survey
Human values (eg, pleasure, privacy, and social justice) are what a person or a society
considers important. Inability to address them in software-intensive systems can result in …
considers important. Inability to address them in software-intensive systems can result in …
A model-driven approach to ensure trust in the IoT
Abstract The Internet of Things (IoT) is a paradigm that permits smart entities to be
interconnected anywhere and anyhow. IoT opens new opportunities but also rises new …
interconnected anywhere and anyhow. IoT opens new opportunities but also rises new …
On the shift to decentralised identity management in distributed data exchange systems
The commonly used centralised trust and centralised identity management make information
systems and organisations prone to a single point of failure. Therefore, decentralised identity …
systems and organisations prone to a single point of failure. Therefore, decentralised identity …