Aniketos project (2013):
Deliverable 5.2 Initial ANIKETOS platform integration.
Technical Report.
Seventh Framework Programme.
Available at http://www.aniketos.eu/content/deliverables.
Aniketos project (2013):
Deliverable D4.3 Algorithms for responding to changes and threats.
Technical Report.
Seventh Framework Programme.
Available at http://www.aniketos.eu/content/deliverables.
Achim Brucker & Isabelle Hang (2013):
Secure and Compliant Implementation of Business Process-Driven Systems.
In: Business Process Management Workshops,
Lecture Notes in Business Information Processing 132.
Springer Berlin Heidelberg,
pp. 662–674,
doi:10.1007/978-3-642-36285-9_66.
Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi & Bo Zhou (2013):
A Framework for Secure Service Composition.
In: ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT).
IEEE Computer Society,
Los Alamitos, CA, USA,
pp. 647–652,
doi:10.1109/SocialCom.2013.97.
Available at http://www.brucker.ch/bibliography/abstract/brucker.ea-framework-2013.
Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri & Inger Anne Tøndel (2009):
An Architectural Foundation for Security Model Sharing and Reuse.
In: Availability, Reliability and Security, 2009. ARES '09. International Conference on,
pp. 823–828,
doi:10.1109/ARES.2009.110.
Per Håkon Meland & Erlend Andreas Gjære (2012):
Representing Threats in BPMN 2.0..
In: ARES.
IEEE Computer Society,
pp. 542–550,
doi:10.1109/ARES.2012.13.
Per Håkon Meland, Erlend Andreas Gjære & Stephane Paul (2013):
The Use and Usefulness of Threats in Goal-Oriented Modelling.
In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on,
pp. 428–436,
doi:10.1109/ARES.2013.57.
E. Oladimeji, S. Supakkul & L. Chung (2006):
Security threat Modeling and Analysis: A goal-oriented approach.
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti & Paolo Giorgini (2012):
STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements.
In: Advances in Conceptual Modeling,
Lecture Notes in Computer Science 7518.
Springer Berlin Heidelberg,
pp. 396–399,
doi:10.1007/978-3-642-33999-8_48.
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti & Paolo Giorgini (2013):
Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool.
In: ER,
pp. 504–507,
doi:10.1007/978-3-642-41924-9_45.
SESAR Joint Undertaking (2014):
Single European Sky ATM Research (SESAR).
Available at http://www.sesarju.eu.
University of Trento (2013):
Website of the Socio-Technical Security modelling language and tool.
Available at http://www.sts-tool.eu/.
Christian Wolter, Michael Menzel, Andreas Schaad, Philip Miseldine & Christoph Meinel (2009):
Model-driven business process security requirement specification.
Journal of Systems Architecture 55(4),
pp. 211–223,
doi:10.1016/j.sysarc.2008.10.002.
Secure Service-Oriented Architectures (Special Issue on Secure SOA).
World Wide Web Consortium (W3C) (2013):
Web Services Description Language (WSDL) 1.1.
Available at http://www.w3.org/TR/wsdl.
Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim & Madjid Merabti (2013):
Prototype for design-time secure and trustworthy service composition.
In: Consumer Communications and Networking Conference (CCNC), 2013 IEEE,
pp. 847–848,
doi:10.1109/CCNC.2013.6488561.
Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti & David Lamb (2012):
Secure Service Composition Adaptation Based on Simulated Annealing.
In: 6th Layered Assurance Workshop,
pp. 49.