Naved Ahmed
Cited by
Cited by
An extension of business process model and notation for security risk management
O Altuhhov, R Matulevičius, N Ahmed
International Journal of Information System Modeling and Design (IJISMD) 4 …, 2013
Securing business processes using security risk-oriented patterns
N Ahmed, R Matulevičius
Computer Standards & Interfaces 36 (4), 723-733, 2014
Modelling families of business process variants: a decomposition driven method
F Milani, M Dumas, N Ahmed, R Matulevičius
Information Systems 56, 55-72, 2016
Towards definition of secure business processes
O Altuhhova, R Matulevičius, N Ahmed
Advanced Information Systems Engineering Workshops: CAiSE 2012 International …, 2012
Towards security risk-oriented misuse cases
I Soomro, N Ahmed
Business Process Management Workshops: BPM 2012 International Workshops …, 2013
Criteria and heuristics for business process model decomposition: review and comparative evaluation
F Milani, M Dumas, R Matulevičius, N Ahmed, S Kasela
Business & Information Systems Engineering 58, 7-17, 2016
A taxonomy for assessing security in business process modelling
N Ahmed, R Matulevičius
IEEE 7th International Conference on Research Challenges in Information …, 2013
Deriving security requirements from business process models
N Ahmed
A Method for Eliciting Security Requirements from the Business Process Models.
N Ahmed, R Matulevicius
CAiSE (Forum/Doctoral Consortium) 1164, 57-64, 2014
Presentation and validation of method for security requirements elicitation from business processes
N Ahmed, R Matulevičius
Information Systems Engineering in Complex Environments: CAiSE Forum 2014 …, 2015
Towards transformation guidelines from secure tropos to misuse cases (position paper)
N Ahmed, R Matulevičius
Proceedings of the 7th International Workshop on Software Engineering for …, 2011
Refining security requirement elicitation from business processes using method engineering
K Sandkuhl, R Matulevicius, N Ahmed, M Kirikova
BIR 2015 Workshops and Doctoral Consortium co-located with 14th …, 2015
A Model Transformation from Misuse Cases to Secure Tropos.
N Ahmed, R Matulevicius, H Mouratidis
CAiSE Forum, 7-14, 2012
Eliciting security requirements for business processes using patterns
N Ahmed, R Matulevičius, NH Khan
Proceedings of the 9th International Workshop on Security in Information …, 2012
Integration of it-security aspects into information demand analysis and patterns
K Sandkuhl, R Matulevicius, M Kirikova, N Ahmed
BIR 2015 Workshops and Doctoral Consortium co-located with 14th …, 2015
Eliciting security requirements from the business processes using security risk-oriented patterns
R Matulevičius, N Ahmed
it-Information Technology 55 (6), 225-230, 2013
SREBP: Security Requirement Elicitation from Business Processes.
N Ahmed, R Matulevicius
REFSQ Workshops, 145-146, 2014
Current Use of and Requirement 25
N Ahmed
Nutrient Management for Sustainable Crop Production in Asia, 307, 1998
Visionary Papers
E Goettelmann, K Dahman, B Gateau, C Godart, N Ahmed, R Matulevičius, ...
The system can't perform the operation now. Try again later.
Articles 1–19