Social Modeling and i*

ES Yu - … modeling: Foundations and applications: Essays in …, 2009 - Springer
Many different types of models are used in various scientific and engineering fields,
reflecting the subject matter and the kinds of understanding that is sought in each field …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022 - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

Business process modelling challenges and solutions: a literature review

Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …

Reusable knowledge in security requirements engineering: a systematic mapping study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities

G Elahi, E Yu, N Zannone - Requirements engineering, 2010 - Springer
Many security breaches occur because of exploitation of vulnerabilities within the system.
Vulnerabilities are weaknesses in the requirements, design, and implementation, which …

Survey of business process management: challenges and solutions

Y Alotaibi, F Liu - Enterprise Information Systems, 2017 - Taylor & Francis
The current literature shows that creating a good framework on business process model
(PM) is not an easy task. A successful business PM should have the ability to ensure …

Operationalizing human values in software engineering: A survey

M Shahin, W Hussain, A Nurwidyantoro, H Perera… - IEEE …, 2022 - ieeexplore.ieee.org
Human values (eg, pleasure, privacy, and social justice) are what a person or a society
considers important. Inability to address them in software-intensive systems can result in …

A model-driven approach to ensure trust in the IoT

D Ferraris, C Fernandez-Gago, J Lopez - Human-centric Computing and …, 2020 - Springer
Abstract The Internet of Things (IoT) is a paradigm that permits smart entities to be
interconnected anywhere and anyhow. IoT opens new opportunities but also rises new …

On the shift to decentralised identity management in distributed data exchange systems

M Bakhtina, R Matulevičius, A Awad… - Proceedings of the 38th …, 2023 - dl.acm.org
The commonly used centralised trust and centralised identity management make information
systems and organisations prone to a single point of failure. Therefore, decentralised identity …