An extension of business process model and notation for security risk management O Altuhhov, R Matulevičius, N Ahmed International Journal of Information System Modeling and Design (IJISMD) 4 …, 2013 | 84 | 2013 |
Securing business processes using security risk-oriented patterns N Ahmed, R Matulevičius Computer Standards & Interfaces 36 (4), 723-733, 2014 | 77 | 2014 |
Modelling families of business process variants: a decomposition driven method F Milani, M Dumas, N Ahmed, R Matulevičius Information Systems 56, 55-72, 2016 | 60 | 2016 |
Towards definition of secure business processes O Altuhhova, R Matulevičius, N Ahmed Advanced Information Systems Engineering Workshops: CAiSE 2012 International …, 2012 | 47 | 2012 |
Towards security risk-oriented misuse cases I Soomro, N Ahmed Business Process Management Workshops: BPM 2012 International Workshops …, 2013 | 35 | 2013 |
Criteria and heuristics for business process model decomposition: review and comparative evaluation F Milani, M Dumas, R Matulevičius, N Ahmed, S Kasela Business & Information Systems Engineering 58, 7-17, 2016 | 25 | 2016 |
A taxonomy for assessing security in business process modelling N Ahmed, R Matulevičius IEEE 7th International Conference on Research Challenges in Information …, 2013 | 23 | 2013 |
Deriving security requirements from business process models N Ahmed | 18 | 2014 |
A Method for Eliciting Security Requirements from the Business Process Models. N Ahmed, R Matulevicius CAiSE (Forum/Doctoral Consortium) 1164, 57-64, 2014 | 16 | 2014 |
Presentation and validation of method for security requirements elicitation from business processes N Ahmed, R Matulevičius Information Systems Engineering in Complex Environments: CAiSE Forum 2014 …, 2015 | 11 | 2015 |
Towards transformation guidelines from secure tropos to misuse cases (position paper) N Ahmed, R Matulevičius Proceedings of the 7th International Workshop on Software Engineering for …, 2011 | 7 | 2011 |
Refining security requirement elicitation from business processes using method engineering K Sandkuhl, R Matulevicius, N Ahmed, M Kirikova BIR 2015 Workshops and Doctoral Consortium co-located with 14th …, 2015 | 6 | 2015 |
A Model Transformation from Misuse Cases to Secure Tropos. N Ahmed, R Matulevicius, H Mouratidis CAiSE Forum, 7-14, 2012 | 6 | 2012 |
Eliciting security requirements for business processes using patterns N Ahmed, R Matulevičius, NH Khan Proceedings of the 9th International Workshop on Security in Information …, 2012 | 5 | 2012 |
Lecture outline G Sindre, AL Opdahl, R Matulevičius, N Mayer, P Heymans, N Ahmed, ... Engineering Journal 10 (1), 34-44, 2005 | 5 | 2005 |
Integration of it-security aspects into information demand analysis and patterns K Sandkuhl, R Matulevicius, M Kirikova, N Ahmed BIR 2015 Workshops and Doctoral Consortium co-located with 14th …, 2015 | 3 | 2015 |
Eliciting security requirements from the business processes using security risk-oriented patterns R Matulevičius, N Ahmed it-Information Technology 55 (6), 225-230, 2013 | 2 | 2013 |
SREBP: Security Requirement Elicitation from Business Processes. N Ahmed, R Matulevicius REFSQ Workshops, 145-146, 2014 | | 2014 |
Current Use of and Requirement 25 N Ahmed Nutrient Management for Sustainable Crop Production in Asia, 307, 1998 | | 1998 |
Visionary Papers E Goettelmann, K Dahman, B Gateau, C Godart, N Ahmed, R Matulevičius, ... | | |