Securing business processes using security risk-oriented patterns, Computer Standards & Interfaces, vol.36, issue.4, pp.723-733, 2014. ,
DOI : 10.1016/j.csi.2013.12.007
Presentation and Validation of Method for Security Requirements Elicitation from Business Processes, Information Systems Engineering in Complex Environments, 2015. ,
DOI : 10.1007/978-3-319-19270-3_2
Security Engineering: A Guide to Building Dependable Distributed Systems, 2008. ,
Quo vadis cyber-physical systems: research areas of cyber-physical ecosystems: a position paper, Proceedings of the 1st International Workshop on Control Theory for Software Engineering, CTSE 2015, pp.22-25, 2015. ,
DOI : 10.1145/1837274.1837462
The global airline industry, 2015. ,
DOI : 10.1002/9780470744734
A Systematic Approach to Define the Domain of Information System Security Risk Management, pp.289-306, 2010. ,
DOI : 10.1007/978-3-642-12544-7_16
Secure System Development with UML, 2005. ,
Inter-enterprise Business Transaction Management in Open Service Ecosystems, 2012 IEEE 16th International Enterprise Distributed Object Computing Conference, pp.31-40, 2012. ,
DOI : 10.1109/EDOC.2012.14
ADS-B vulnerability to low cost jammers: Risk assessment and possible solutions, 2014 Tyrrhenian International Workshop on Digital Communications, Enhanced Surveillance of Aircraft and Vehicles (TIWDC/ESAV), pp.41-46, 2014. ,
DOI : 10.1109/TIWDC-ESAV.2014.6945445
Socioanalytic methods: discovering the hidden in organisations and social systems, Karnac Books, 2013. ,
Inventing Requirements: Experiences with an Airport Operations System, Proceedings of REFSQ 2008, pp.58-72, 2008. ,
DOI : 10.1007/978-3-540-69062-7_6
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain, Journal of Systems and Software, vol.95, pp.70-88, 2014. ,
DOI : 10.1016/j.jss.2013.11.1098
Model-based Management of Information System Security Risk, 2009. ,
URL : https://hal.archives-ouvertes.fr/tel-00402996
Service Brokering Environment for an Airline, 2015. ,
A reference architecture for managing dynamic inter-organizational business processes, Data & Knowledge Engineering, vol.91, issue.0, pp.52-89, 2014. ,
DOI : 10.1016/j.datak.2014.04.001
eContractual choreography-language properties towards cross-organizational business collaboration, Journal of Internet Services and Applications, vol.44, issue.4, pp.1-23, 2015. ,
DOI : 10.1007/978-94-007-5583-3
URL : https://jisajournal.springeropen.com/track/pdf/10.1186/s13174-015-0023-7?site=jisajournal.springeropen.com
Revision of Security Risk-oriented Patterns for Distributed Systems, 2016. ,
Aviation Cyber???Physical Systems: Foundations for Future Aircraft and Air Transport, Proceedings of the IEEE, vol.101, issue.8, pp.1834-1855, 2013. ,
DOI : 10.1109/JPROC.2012.2235131
Security Patterns, Informatik-Spektrum, vol.25, issue.3, 2005. ,
DOI : 10.1007/s002870200223
A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies, 2014 Ninth International Conference on Availability, Reliability and Security, pp.514-522, 2014. ,
DOI : 10.1109/ARES.2014.76
Threat Modeling: Designing for Security, 2014. ,
An extensible pattern-based library and taxonomy of security threats for distributed systems, Computer Standards & Interfaces, vol.36, issue.4, pp.734-747, 2013. ,
DOI : 10.1016/j.csi.2013.12.008