From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 51-61. Springer, (2006)Security requirements engineering framework for software product lines., , и . Inf. Softw. Technol., 52 (10): 1094-1117 (2010)A BPMN Extension for the Modeling of Security Requirements in Business Processes., , и . IEICE Trans. Inf. Syst., 90-D (4): 745-752 (2007)A Comparison of Secure Information Systems Design Methodologies., , и . CAiSE Workshops (1), стр. 189-198. Faculty of Computer Science and Information Technology, Riga Technical University, Riga, Latvia, (2004)Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics., , и . Security and Management, стр. 109-117. CSREA Press, (2004)PWSSEC: Proceso de Desarrollo para Seguridad de Servicios., , и . JISBD, стр. 203-210. Thomson, (2005)Aplicación práctica de un proceso de ingeniería de requisitos de seguridad., , и . JISBD, стр. 315-324. (2006)A practical application of our MDD approach for modeling secure XML data warehouses., , , и . Decis. Support Syst., 52 (4): 899-925 (2012)Secure business process model specification through a UML 2.0 activity diagram profile., , , и . Decis. Support Syst., 51 (3): 446-465 (2011)Main Issues in Big Data Security., , и . Future Internet, 8 (3): 44 (2016)