References: [1] Weske, M. Business Process Management: Concepts, Languages, Architectures. [2] Neubauer, T., Klemen, M. & Biffl, S. (2006) Secure business process management: A roadmap. In: 1st International Conference on Availability, Reliability and Security (ARES 2006). IEEE Publications. Springer: Heidelberg (2010), p. 8. [3] Mitasiunas, A., Novickis, L. & Kalpokas, R. (2014) Security process capability model based on ISO/IEC 15504 conformant enterprise SPICE. Applied Computer Systems, 15, Issue 1 (Jul 2014), 36–41 [4] Deleuze, G. & Guattari, F. (1983) Anti-Oedipus, translated from the French by R. Hurley. Marketer Seem, and Helen R. University of Minnesota Press: Lane (Originally 1972). [5] Al-Fedaghi, S. & Alduwaisan, Y. (2018) Process modeling for analysis and control: A case study of IT services. International Journal of Control and Automation, 11, pp, 25–42. [6] Al Fedaghi, S. & Abdullah, A. (2017) Flow-based systems modeling: Application in airport system description. International Journal of Industrial and Systems Engineering, 25, 318–334 [DOI: 10.1504/IJISE.2017.10002580]. [7] Al-Fedaghi, S. (2017) Context-aware software systems: Toward a diagrammatic modeling foundation. J. Theoretical Appl. Inform. Technol., 95. [8] Al-Fedaghi, S. & Alahmad, H. Orientation in conceptual modeling frameworks 3rd IEEE International Conference on Big Data Intelligence and Computing, Orlando, USA, 6–10 November, 2017 [DOI: 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.209]. [9] Al-Fedaghi, S. & Alahmad, H. (2018) Integrated modeling methodologies and languages. Academic Medicine 12th International Conference on Ubiquitous Information Management and Communication, Langkawi, Malaysia, 5–7 January, 2018. [10] Al-Fedaghi, S. Activity recognition and sensor positioning IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2016), 9–12 October, Budapest, Hungary. [11] Al-Fedaghi, S. Schematizing proofs based on flow of truth values in logic IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), 13–16 October, Manchester, UK [DOI: 10.1109/SMC.2013.40]. [12] Aagesen, G. & Krogstie, J. (2010), pp Analysis and design of business processes using BPMN. In: Handbook on Business Process Management 1. International Handbooks on Information Systems (edited by J. vom Brocke & M. Rosemann). Springer- Verlag: Berlin. [13] von Rosing, M., Foldage, U., Hove, M., von Scheel, J. & Bøgebjerg, A.F. (2015). Working with the Business Process Management (BPM) Life Cycle, the Complete Business Process Handbook, Vol. 1. Elsevier: Amsterdam [DOI: 10.1016/B978-0-12- 799959-3.00014-8]. [14] Dumas, M., La Rosa, M., Mendling, J. & Reijers, H. (2018). Fundamentals of Business Process Management. Springer-Verlag: Berlin, Heidelberg [DOI: 10.1007/978-3-662-56509-4]. [15] Lampathaki, F., Koussouris, S. & Psarras, J. (2013) Business process modeling: Business process reengineering. Location. [16] Object Management Group. About the Unified Modeling Language Specification, version 2.5 (2015). www.omg.org/spec/ UML/About-UML/. [17] Corradini, F., Fornari, F., Polini, A., Re, B., Tiezzi, F. & Vandin, A. (2017) BProVe: A formal verification framework for business process models. In: Proceedings of the 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE Publications, pp. 217–228. [18] Scheer, I.D.S. & ARIS (Architecture of Integrated Information Systems) Location. Springer: Berlin (1992). [19] Ko, R.K.L., Lee, S.S.G. & Lee, E.W. (2009) Business process management (BPM) standards: A survey. Business Process Management Journal, 15, pp, 744–791 [DOI: 10.1108/14637150910987937]. [20] Havey, M. (2006) Keeping BPM simple for business users: Power users beware. BPTrends. mchavey.blogspot.com/2016/04/ the-mike-havey-collection.html#. January 2006!/2016/04/the-mike-havey-collection.html. [21] Argyropoulos, N., Mouratidis, H. & Fish, A. (2017) Supporting secure business process design via security process patterns. In: BPMDS/EMMSAD 2017, LNBIP, Vol. 287 (edited by I. Reinhartz-Berger), pp. 19–33. [22] Specification of Business Process Modeling Notation version 2.0 (BPMN 2.0) [Online] (2017). www.omg.org/spec/BPMN/ 2.0/PDF. [23] Saleem, M.Q., Jaafar, J. & Hassan, M.F. (2012) Security modelling along business process model of SOA systems using modified “”UML-SOA-Sec” International Conference on Computer & Information Science (ICCIS). [24] Rodríguez, A., Guzmán, I.Gd, Fernández-Medina, E. & Piattini, M. (2010) Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach. Information and Software Technology, 52, 945–971. [25] Morse, R.E., Nadkarni, P., Schoenfeld, D.A. & Finkelstein, D.M. (2011). www.biomedcentral.com/1472-6947/11/70 Web-browser encryption of personal health information. BMC Medical Informatics and Decision Making, 11, 70. [26] CGI Group, Inc. (2004). Public Key Encryption and Digital Signature: How Do They Work? [White paper]. https:// www.google.com/url?sa= t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwiGgOiR1qjaAhWGtBQKHX5CCvY QFggkMAA&url=https%3A%2F%2Fwww.cgi.com%2Ffiles%2Fwhite-papers%2Fcgi_whpr_35_pki_e.pdf&usg=AOvVa w1Xscgpmo3SSPLFg30LoE4G. |