Journal Navigation
Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013)
Volume 5
Martin Gilje Jaatun, Riccardo Scandariato, Lillian Røstad
Published: Apr 1, 2014
DOI: 10.4018/ijsse.2014040101
Volume 5
Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, Paolo Giorgini
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing... Show More
Download Sample (PDF): Article
Cite Article

MLA

Meland, Per Håkon, et al. "Threat Analysis in Goal-Oriented Security Requirements Modelling." IJSSE vol.5, no.2 2014: pp.1-19. http://doi.org/10.4018/ijsse.2014040101

APA

Meland, P. H., Paja, E., Gjære, E. A., Paul, S., Dalpiaz, F., & Giorgini, P. (2014). Threat Analysis in Goal-Oriented Security Requirements Modelling. International Journal of Secure Software Engineering (IJSSE), 5(2), 1-19. http://doi.org/10.4018/ijsse.2014040101

Chicago

Meland, Per Håkon, et al. "Threat Analysis in Goal-Oriented Security Requirements Modelling," International Journal of Secure Software Engineering (IJSSE) 5, no.2: 1-19. http://doi.org/10.4018/ijsse.2014040101

Export Reference

Mendeley
Published: Apr 1, 2014
DOI: 10.4018/ijsse.2014040102
Volume 5
Kristian Beckers, Isabelle Côté, Ludger Goeke, Selim Güler, Maritta Heisel
Cloud computing systems offer an attractive alternative to traditional IT-systems, because of economic benefits that arise from the cloud's scalable and flexible IT-resources. The benefits are of... Show More
Download Sample (PDF): Article
Cite Article

MLA

Beckers, Kristian, et al. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain." IJSSE vol.5, no.2 2014: pp.20-43. http://doi.org/10.4018/ijsse.2014040102

APA

Beckers, K., Côté, I., Goeke, L., Güler, S., & Heisel, M. (2014). A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain. International Journal of Secure Software Engineering (IJSSE), 5(2), 20-43. http://doi.org/10.4018/ijsse.2014040102

Chicago

Beckers, Kristian, et al. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain," International Journal of Secure Software Engineering (IJSSE) 5, no.2: 20-43. http://doi.org/10.4018/ijsse.2014040102

Export Reference

Mendeley
Published: Apr 1, 2014
DOI: 10.4018/ijsse.2014040103
Volume 5
Vincenzo Ciancia, Jose Martin, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Ernesto Pimentel
The authors describe a formal methodology for the automatic synthesis of a secure orchestrator for a set of BPMN processes. The synthesized orchestrator is able to guarantee that all the processes... Show More
Download Sample (PDF): Article
Cite Article

MLA

Ciancia, Vincenzo, et al. "Automated Synthesis and Ranking of Secure BPMN Orchestrators." IJSSE vol.5, no.2 2014: pp.44-64. http://doi.org/10.4018/ijsse.2014040103

APA

Ciancia, V., Martin, J., Martinelli, F., Matteucci, I., Petrocchi, M., & Pimentel, E. (2014). Automated Synthesis and Ranking of Secure BPMN Orchestrators. International Journal of Secure Software Engineering (IJSSE), 5(2), 44-64. http://doi.org/10.4018/ijsse.2014040103

Chicago

Ciancia, Vincenzo, et al. "Automated Synthesis and Ranking of Secure BPMN Orchestrators," International Journal of Secure Software Engineering (IJSSE) 5, no.2: 44-64. http://doi.org/10.4018/ijsse.2014040103

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100