References

  1. Activiti (2013): Activiti BPM platform website. Available at http://www.activiti.org/.
  2. Aniketos project (2013): Deliverable 5.2 Initial ANIKETOS platform integration. Technical Report. Seventh Framework Programme. Available at http://www.aniketos.eu/content/deliverables.
  3. Aniketos project (2013): Deliverable D4.3 Algorithms for responding to changes and threats. Technical Report. Seventh Framework Programme. Available at http://www.aniketos.eu/content/deliverables.
  4. Achim Brucker & Isabelle Hang (2013): Secure and Compliant Implementation of Business Process-Driven Systems. In: Business Process Management Workshops, Lecture Notes in Business Information Processing 132. Springer Berlin Heidelberg, pp. 662–674, doi:10.1007/978-3-642-36285-9_66.
  5. Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi & Bo Zhou (2013): A Framework for Secure Service Composition. In: ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). IEEE Computer Society, Los Alamitos, CA, USA, pp. 647–652, doi:10.1109/SocialCom.2013.97. Available at http://www.brucker.ch/bibliography/abstract/brucker.ea-framework-2013.
  6. Eurocontrol (2014): System Wide Information Management (SWIM). Available at http://www.eurocontrol.int/swim.
  7. The Apache Software Foundation (2013): Apache ActiveMQ website. Available at http://activemq.apache.org/.
  8. The Eclipse Foundation (2013): Eclipse IDE downloads website. Available at http://www.eclipse.org/downloads/.
  9. Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri & Inger Anne Tøndel (2009): An Architectural Foundation for Security Model Sharing and Reuse. In: Availability, Reliability and Security, 2009. ARES '09. International Conference on, pp. 823–828, doi:10.1109/ARES.2009.110.
  10. Per Håkon Meland & Erlend Andreas Gjære (2012): Representing Threats in BPMN 2.0.. In: ARES. IEEE Computer Society, pp. 542–550, doi:10.1109/ARES.2012.13.
  11. Per Håkon Meland, Erlend Andreas Gjære & Stephane Paul (2013): The Use and Usefulness of Threats in Goal-Oriented Modelling. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pp. 428–436, doi:10.1109/ARES.2013.57.
  12. E. Oladimeji, S. Supakkul & L. Chung (2006): Security threat Modeling and Analysis: A goal-oriented approach.
  13. OMG (2011): Business Process Model and Notation (BPMN) Version 2.0. Available at http://www.omg.org/spec/BPMN/2.0/.
  14. Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti & Paolo Giorgini (2012): STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements. In: Advances in Conceptual Modeling, Lecture Notes in Computer Science 7518. Springer Berlin Heidelberg, pp. 396–399, doi:10.1007/978-3-642-33999-8_48.
  15. Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti & Paolo Giorgini (2013): Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool. In: ER, pp. 504–507, doi:10.1007/978-3-642-41924-9_45.
  16. SHIELDS project (2013): Security Vulnerability Repository Service (SVRS). Available at https://svrs.shields-project.eu/SVRS/.
  17. SESAR Joint Undertaking (2014): Single European Sky ATM Research (SESAR). Available at http://www.sesarju.eu.
  18. University of Trento (2013): Website of the Socio-Technical Security modelling language and tool. Available at http://www.sts-tool.eu/.
  19. Christian Wolter, Michael Menzel, Andreas Schaad, Philip Miseldine & Christoph Meinel (2009): Model-driven business process security requirement specification. Journal of Systems Architecture 55(4), pp. 211–223, doi:10.1016/j.sysarc.2008.10.002. Secure Service-Oriented Architectures (Special Issue on Secure SOA).
  20. World Wide Web Consortium (W3C) (2013): Web Services Description Language (WSDL) 1.1. Available at http://www.w3.org/TR/wsdl.
  21. Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim & Madjid Merabti (2013): Prototype for design-time secure and trustworthy service composition. In: Consumer Communications and Networking Conference (CCNC), 2013 IEEE, pp. 847–848, doi:10.1109/CCNC.2013.6488561.
  22. Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti & David Lamb (2012): Secure Service Composition Adaptation Based on Simulated Annealing. In: 6th Layered Assurance Workshop, pp. 49.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org