Keyphrases
Aegean
8%
Automated Analysis
16%
Automated Modeling
16%
Automated Security Analysis
8%
BPMN Process Models
8%
Business Process
8%
Business Process Design
16%
Cloud Computing
34%
Cloud Computing Environment
16%
Cloud Environment
5%
Cloud Model
8%
Cloud Modeling Languages
8%
Cloud Security Requirements
8%
Cloud System
19%
Cloud Vulnerabilities
8%
Cloud-based
8%
Computing Concepts
8%
Concept Relationship
8%
Design Patterns
9%
Engineering Approach
6%
Engineering Perspective
8%
Engineering Technique
5%
Goal-oriented
6%
Illustrative Examples
11%
Main Concepts
7%
Manual Task
8%
Mitigation Strategies
8%
Modeling Language
14%
Office System
8%
Organizational Security
8%
Privacy Concerns
11%
Process Transformation
8%
Property Concepts
8%
Requirements Engineering
41%
Requirements Modeling Language
16%
SecTro
28%
Secure Business Processes
16%
Secure Cloud Computing
16%
Secure Tropos
100%
Security Analysis
21%
Security Choice
8%
Security Concept
14%
Security Constraints
19%
Security Engineering
8%
Security Goals
18%
Security Issues
16%
Security Privacy
16%
Security Requirements
28%
Security Requirements Engineering
37%
Security Requirements Modeling
16%
Security Threats
5%
Security-aware
7%
Semi-automated
8%
Software Product Lines
16%
Software System
25%
System Development Process
5%
Technical Dimension
5%
Transformation Approach
8%
Transformation Process
8%
Tropos Goal Model
8%
Tropos Methodology
22%
Unique Characteristics
5%
Usage Example
8%
Computer Science
Business Process
16%
Business Process Model and Notation
5%
Case Study
9%
Cloud Computing
42%
Cloud Environment
6%
Cloud Security
5%
cloud system
11%
Cloud Vulnerability
5%
Critical Aspect
5%
Design Pattern
10%
Development Process
26%
Development Stage
6%
Elicitation
9%
Functional Requirement
5%
Information Systems
16%
Mitigation Strategy
5%
modeling language
22%
Organizational Security
5%
Process Model
11%
Process Transformation
5%
Related Concept
7%
Requirement Engineering
64%
Security Analysis
7%
Security and Privacy
16%
Security Concept
16%
Security Engineering
7%
Security Objective
6%
Security Requirements
73%
Software Product Line
16%
Software Systems
33%
System Development
9%
Technical Dimension
5%
Transformation Process
5%
Tropos Methodology
34%