{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T05:35:08Z","timestamp":1737783308455,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387763118"},{"type":"electronic","value":"9780387763125"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-76312-5_50","type":"book-chapter","created":{"date-parts":[[2007,12,28]],"date-time":"2007-12-28T22:00:00Z","timestamp":1198879200000},"page":"1239-1249","source":"Crossref","is-referenced-by-count":9,"title":["CIM to PIM Transformation: A Reality"],"prefix":"10.1007","author":[{"given":"Alfonso","family":"Rodr\u00edguez","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Fern\u00e1ndez-Medina","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Piattini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"50_CR1","first-page":"21","volume":"5","author":"J. B\u00e9zivin","year":"2004","unstructured":"J. B\u00e9zivin, In Search of a Basic Principle for Model Driven Engineering, UPGRADE, European Journal for the Informatics Professional. Volume 5, Number 2, pp.21\u201324, (2004).","journal-title":"UPGRADE, European Journal for the Informatics Professional"},{"unstructured":"Object Management Group, MDA Guide Version 1.0.1. http:\/\/www.omg.org\/docs\/omg\/03-06-01.pdf . (Accessed 2003).","key":"50_CR2"},{"unstructured":"QVT, Meta Object Facility (MOF) 2.0 Query\/View\/Transformation Specification, OMG Adopted Specification ptc\/05-11-01 (2005), p.204.","key":"50_CR3"},{"unstructured":"WfMC, Workflow Management Coalition: Terminology & Glossary (1999), p.65.","key":"50_CR4"},{"key":"50_CR5","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/11824633_6","volume":"4083","author":"A. Rodr\u00edguez","year":"2006","unstructured":"A. Rodr\u00edguez, E. Fern\u00e1ndez-Medina, and M. Piattini, Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes, in Proc. of 3rd International Conference on Trust, Privacy and Security in Digital Business (TrustBus). Volume 4083 (Krakow, Poland, 2006), pp.51\u201361.","journal-title":"Proc. of 3rd International Conference on Trust, Privacy and Security in Digital Business (TrustBus)"},{"issue":"4","key":"50_CR6","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"E90-D","author":"A. Rodr\u00edguez","year":"2007","unstructured":"A. Rodr\u00edguez, E. Fern\u00e1ndez-Medina, and M. Piattini, A BPMN Extension for the Modeling of Security Requirements in Business Processes, IEICE Transactions on Information and Systems. Volume E90-D, Number 4, pp.745\u2013752, (2007).","journal-title":"IEICE Transactions on Information and Systems"},{"unstructured":"Object Management Group, Unified Modeling Language: Superstructure Version 2.1.1 (formal\/2007-02-05). http:\/\/www.omg.org\/docs\/formal\/07-02-05.pdf (Accessed 2007).","key":"50_CR7"},{"unstructured":"BPMN, Business Process Modeling Notation Specification, OMG Final Adopted Specification, dtc\/06-02-01. http:\/\/www.bpmn.org\/Documents\/OMG%20Final%20Adopted%20BPMN%201-0%20Spec%2006-02-01.pdf (Accessed 2006).","key":"50_CR8"},{"key":"50_CR9","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-44895-0_12","volume":"2678","author":"M. Backes","year":"2003","unstructured":"M. Backes, B. Pfitzmann, and M. Waider, Security in Business Process Engineering, in International Conference on Business Process Management (BPM). Volume. 2678, LNCS (Eindhoven, Netherlands, 2003), pp.168\u2013183.","journal-title":"International Conference on Business Process Management (BPM)"},{"doi-asserted-by":"crossref","unstructured":"G. Herrmann and G. Pernul, Viewing Business Process Security from Different Perspectives, in Proc. of 11th International Bled Electronic Commerce Conference (Slovenia, 1998), pp.89\u2013103.","key":"50_CR10","DOI":"10.1080\/10864415.1999.11518343"},{"issue":"3\u20134","key":"50_CR11","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10660-006-8677-7","volume":"6","author":"P. Herrmann","year":"2006","unstructured":"P. Herrmann and G. Herrmann, Security requirement analysis of business processes, Electronic Commerce Research. Volume 6, Number 3\u20134, pp.305\u2013335, (2006).","journal-title":"Electronic Commerce Research"},{"doi-asserted-by":"crossref","unstructured":"A. Ma\u00f1a, J. A. Montenegro, C. Rudolph and J. L. Vivas, A business process-driven approach to security engineering, in 14th. International Workshop on Database and Expert Systems Applications (DEXA) (Prague, Czech Republic, 2003), pp.477\u2013481.","key":"50_CR12","DOI":"10.1109\/DEXA.2003.1232069"},{"doi-asserted-by":"crossref","unstructured":"A. W. R\u00f6hm, G. Pernul and G. Herrmann, Modelling Secure and Fair Electronic Commerce, in Proc. of 14th. Annual Computer Security Applications Conference (Scottsdale, Arizona, 1998), pp.155\u2013164.","key":"50_CR13","DOI":"10.1109\/CSAC.1998.738608"},{"issue":"1","key":"50_CR14","doi-asserted-by":"crossref","first-page":"61","DOI":"10.5381\/jot.2004.3.1.c6","volume":"3","author":"D. Firesmith","year":"2004","unstructured":"D. Firesmith, Specifying Reusable Security Requirements, Journal of Object Technology. Volume 3, Number 1, pp.61\u201375, (2004).","journal-title":"Journal of Object Technology"},{"issue":"5","key":"50_CR15","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.csi.2005.01.005","volume":"27","author":"J. Lopez","year":"2005","unstructured":"J. Lopez, J.A. Montenegro, J.L. Vivas, E. Okamoto and E. Dawson, Specification and design of advanced authentication and authorization services, Computer Standards & Interfaces. Volume 27, Number 5, pp.467\u2013478, (2005).","journal-title":"Computer Standards & Interfaces"},{"unstructured":"I. Jacobson, G. Booch and J. Rumbaugh, The Unified Software Development Process (1999), pp.463-.","key":"50_CR16"},{"unstructured":"A. Rodr\u00edguez, E. Fern\u00e1ndez-Medina and M. Piattini, M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification, in 3rd International Workshop on Foundations and Practices of UML (Auckland, New Zealand, 2007).","key":"50_CR17"},{"doi-asserted-by":"crossref","unstructured":"A. Rodr\u00edguez, E. Fern\u00e1ndez-Medina and M. Piattini, Analysis-Level Classes from Secure Business Processes through Models Transformations, in Proc. of 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus) (Regensburg, Germany, 2007).","key":"50_CR18","DOI":"10.1007\/978-3-540-74409-2_13"},{"unstructured":"A. Rodr\u00edguez and I. Garc\u00eda-Rodr\u00edguez de Guzm\u00e1n, Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach, in Workshop on Security in Information Systems (WOSIS) (Funchal, Madeira-Portugal, 2007).","key":"50_CR19"}],"container-title":["IFIP International Federation for Information Processing","Research and Practical Issues of Enterprise Information Systems II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-76312-5_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T22:15:31Z","timestamp":1737756931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-76312-5_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387763118","9780387763125"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-76312-5_50","relation":{},"subject":[]}}