Naved Ahmed

According to our database1, Naved Ahmed authored at least 15 papers between 2011 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Modelling families of business process variants: A decomposition driven method.
Inf. Syst., 2016

Criteria and Heuristics for Business Process Model Decomposition - Review and Comparative Evaluation.
Bus. Inf. Syst. Eng., 2016

2015
Integration of IT-Security Aspects into Information Demand Analysis and Patterns.
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015

Refining Security Requirement Elicitation from Business Processes using Method Engineering.
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015

2014
Securing business processes using security risk-oriented patterns.
Comput. Stand. Interfaces, 2014

SREBP: Security Requirement Elicitation from Business Processes.
Proceedings of the Joint Proceedings of REFSQ-2014 Workshops, 2014

Presentation and Validation of Method for Security Requirements Elicitation from Business Processes.
Proceedings of the Information Systems Engineering in Complex Environments, 2014

A Method for Eliciting Security Requirements from the Business Process Models.
Proceedings of the Joint Proceedings of the CAiSE 2014 Forum and CAiSE 2014 Doctoral Consortium co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014

2013
Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
it Inf. Technol., 2013

An Extension of Business Process Model and Notation for Security Risk Management.
Int. J. Inf. Syst. Model. Des., 2013

A taxonomy for assessing security in business process modelling.
Proceedings of the IEEE 7th International Conference on Research Challenges in Information Science, 2013

2012
Towards Definition of Secure Business Processes.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

A Model Transformation from Misuse Cases to Secure Tropos.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

Towards Security Risk-Oriented Misuse Cases.
Proceedings of the Business Process Management Workshops, 2012

2011
Towards transformation guidelines from secure tropos to misuse cases (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011


  Loading...