The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alfonso Rodríguez: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Security Requirement with a UML 2.0 Profile. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:670-677 [Conf]
  2. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2006, pp:32-42 [Conf]
  3. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards an integration of Security Requirements into Business Process Modeling. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:287-297 [Conf]
  4. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:174-184 [Conf]
  5. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:51-61 [Conf]
  6. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases. [Citation Graph (0, 0)][DBLP]
    BPM, 2007, pp:408-415 [Conf]
  7. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification. [Citation Graph (0, 0)][DBLP]
    ER Workshops, 2007, pp:106-115 [Conf]
  8. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio. [Citation Graph (0, 0)][DBLP]
    JISBD, 2006, pp:347-356 [Conf]
  9. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Analysis-Level Classes from Secure Business Processes Through Model Transformations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:104-114 [Conf]

  10. Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models. [Citation Graph (, )][DBLP]


  11. CIM to PIM Transformation: A Reality. [Citation Graph (, )][DBLP]


  12. Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach. [Citation Graph (, )][DBLP]


  13. LIS2BP: Una propuesta para obtener Procesos de Negocio a partir de los Sistemas Heredados. [Citation Graph (, )][DBLP]


  14. Hacia la Obtención de Procesos de Negocio desde Sistemas de Información Heredados. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002