Business process management: a boundaryless approach to modern competitiveness, Business Process Management Journal, vol.3, issue.1, p.6480, 1997. ,
DOI : 10.1108/14637159710161585
Modeling languages for business processes and business rules: A representational analysis, Information Systems, vol.35, issue.4, 2010. ,
DOI : 10.1016/j.is.2009.02.006
Business Process Management: Concepts, Languages, Architectures, 2007. ,
DOI : 10.1007/978-3-642-28616-2
Metrics for Process Models: Empirical Foundations of Verication, Error Prediction and Guidelines for Correctness, of Lecture Notes in Business Information Processing (LNBIP), 2008. ,
DOI : 10.1007/978-3-540-89224-3
ARIS -Business Process Modeling. 3 edn, 2000. ,
DOI : 10.1007/978-3-642-57108-4
Embedding Information Security into the Organization, IEEE Security & Privacy Magazine, vol.5, issue.3, 2007. ,
DOI : 10.1109/MSP.2007.59
Scenario-Driven Role Engineering, IEEE Security & Privacy Magazine, vol.8, issue.1, 2010. ,
DOI : 10.1109/MSP.2010.46
Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges, 2011 Sixth International Conference on Availability, Reliability and Security, p.686691, 2011. ,
DOI : 10.1109/ARES.2011.107
SPRINT-Responsibilities: design and development of security policies in process-aware information systems, Ubiquitous Computing, and Dependable Applications (JoWUA), p.426, 2011. ,
Modelling security goals in business processes, LNI GI, vol.127, 2008. ,
An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation, 2013 International Conference on Availability, Reliability and Security, 2013. ,
DOI : 10.1109/ARES.2013.34
Workow Resource Patterns: Identication , Representation and Tool Support, Proceedings of the 17th Conference on Advanced Information Systems Engineering (CAiSE, 2005. ,
DOI : 10.1007/11431855_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.5143
On the Usage of Labels and Icons in Business Process Modeling, International Journal of Information System Modeling and Design, vol.1, issue.2, p.4058, 2010. ,
DOI : 10.4018/jismd.2010040103
Towards a More Semantically Transparent i* Visual Syntax, Requirements Engineering: Foundation for Software Quality. Number 7195 in Lecture Notes in Computer Science, p.140146, 2012. ,
DOI : 10.1007/978-3-642-28714-5_12
URL : https://hal.archives-ouvertes.fr/hal-00718136
The "physics" of notations, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE '10, p.779, 2009. ,
DOI : 10.1145/1810295.1810442
Theoretical and practical issues in evaluating the quality of conceptual models: current state and future directions, Data & Knowledge Engineering, vol.55, issue.3, p.243276, 2005. ,
DOI : 10.1016/j.datak.2004.12.005
Cognitive Dimensions of Notations: Design Tools for Cognitive Technology, Cognitive Technology: Instruments of Mind. Number 2117 in Lecture Notes in Computer Science, p.325341, 2001. ,
DOI : 10.1007/3-540-44617-6_31
Cognitive dimensions: Achievements, new directions, and open questions, Journal of Visual Languages & Computing, vol.17, issue.4, p.328365, 2006. ,
DOI : 10.1016/j.jvlc.2006.04.004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.3358
Process models representing knowledge for action: a revised quality framework, European Journal of Information Systems, vol.40, issue.5, p.91102, 2006. ,
DOI : 10.1145/253769.253801
Analysing the cognitive eectiveness of the BPMN 2.0 visual notation, Software Language Engineering. Number 6563 in Lecture Notes in Computer Science, p.377396, 2011. ,
On the cognitive eectiveness of routing symbols in process modeling languages, Business Information Systems. Number 47 in Lecture Notes in Business Information Processing, p.230241, 2010. ,
SecureUML: a UML-Based modeling language for model-driven security. In: UML 2002 The Unied Modeling Language, p.426441, 2002. ,
DOI : 10.1007/3-540-45800-x_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.6554
Modeling support for condentiality and integrity of object ows in activity models, In: Business Information Systems, vol.87, p.278289, 2011. ,
Mal-Activity Diagrams for Capturing Attacks on Business Processes, Proc. of the 13th International Working Conference on Requirement Engineering: Foundation for Software Quality, 2007. ,
DOI : 10.1007/978-3-540-73031-6_27
Internet Security Glossary. Number 2828 in Request for Comments, IETF, 2000. ,
DOI : 10.17487/rfc2828
Information technology -role based access control, 2004. ,
Why looking isn't always seeing: readership skills and graphical programming, Communications of the ACM, vol.38, issue.6, 1995. ,
DOI : 10.1145/203241.203251
Thinking aloud: reconciling theory and practice, IEEE Transactions on Professional Communication, vol.43, issue.3, p.261278, 2000. ,
DOI : 10.1109/47.867942
Modeling process-related RBAC models with extended UML activity models, Information and Software Technology, vol.53, issue.5, 2011. ,
DOI : 10.1016/j.infsof.2010.11.015
A UML Extension for Modeling Break-Glass Policies, Proc. of the 5th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA), 2012. ,
Modeling Support for Delegating Roles, Tasks, and Duties in a Process-Related RBAC Context, Proc. of the International Workshop on Information Systems Security Engineering (WISSE), 2011. ,
DOI : 10.1145/937527.937530