From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A practical application of our MDD approach for modeling secure XML data warehouses., , , и . Decis. Support Syst., 52 (4): 899-925 (2012)Secure business process model specification through a UML 2.0 activity diagram profile., , , и . Decis. Support Syst., 51 (3): 446-465 (2011)Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 51-61. Springer, (2006)Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models., , и . ER Workshops, том 5232 из Lecture Notes in Computer Science, стр. 103-112. Springer, (2008)Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile., , и . ER (Workshops), том 4231 из Lecture Notes in Computer Science, стр. 32-42. Springer, (2006)Applicability of Security Patterns., , , , , и . OTM Conferences (1), том 6426 из Lecture Notes in Computer Science, стр. 672-684. Springer, (2010)Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software., , и . JISBD, стр. 177-186. Thomson Editorial, (2007)Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics., , и . Security and Management, стр. 109-117. CSREA Press, (2004)A Comparison of Secure Information Systems Design Methodologies., , и . CAiSE Workshops (1), стр. 189-198. Faculty of Computer Science and Information Technology, Riga Technical University, Riga, Latvia, (2004)Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application., , и . ER Workshops, том 5833 из Lecture Notes in Computer Science, стр. 126-136. Springer, (2009)