Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns

Raimundas Matulevicius, Naved Ahmed. Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns. it - Information Technology, 55(6):225-230, 2013. [doi]

@article{MatuleviciusA13,
  title = {Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns},
  author = {Raimundas Matulevicius and Naved Ahmed},
  year = {2013},
  doi = {10.1524/itit.2013.2002},
  url = {http://dx.doi.org/10.1524/itit.2013.2002},
  researchr = {https://researchr.org/publication/MatuleviciusA13},
  cites = {0},
  citedby = {0},
  journal = {it - Information Technology},
  volume = {55},
  number = {6},
  pages = {225-230},
}