Name
Affiliation
Papers
RAIMUNDAS MATULEVIČIUS
Institute of Computer Science, University of Tartu, J. Liivi 2, 50409 Tartu, Estonia and Software Technology and Application Competence Center, Ülikooli 4, 51003 Tartu, Estonia
83
Collaborators
Citations 
PageRank 
104
459
44.97
Referers 
Referees 
References 
791
828
653
Search Limit
100828
Title
Citations
PageRank
Year
Ontological Representation of Healthcare Application Security Using Blockchain Technology00.342022
Multi-level privacy analysis of business processes: the Pleak toolset00.342022
Securing an MQTT-based Traffic Light Perception System for Autonomous Driving00.342021
A Method for Managing GDPR Compliance in Business Processes.00.342020
Blockchain Oracles - A Framework for Blockchain-Based Applications.10.362020
Security Risk Management in E-commerce Systems: A Threat-driven Approach00.342020
Corda Security Ontology: Example Of Post-Trade Matching And Confirmation00.342020
Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns.20.382019
Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk.10.342019
Business Process Privacy Analysis in Pleak.00.342019
Privacy-enhanced BPMN: enabling data privacy analysis in business processes models60.552019
Blockchain-Based Application Security Risks: A Systematic Literature Review.00.342019
Business Process Privacy Analysis in Pleak: (Extended Abstract)10.372019
Towards the Reference Model for Security Risk Management in Internet of Things.00.342018
An Empirical Evaluation of the Requirements Engineering Tool for Socio-Technical Systems00.342018
A Coarse-Grained Comparison of BPMN Extensions for Security Requirements Modelling.00.342018
Security Requirements Elicitation from Airline Turnaround Processes.00.342018
Conceptual Representation of the GDPR: Model and Application Directions.00.342018
A Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology.00.342017
Assessment of Aviation Security Risk Management for Airline Turnaround Processes.00.342017
An Approach to Capture Role-Based Access Control Models from Spring Web Applications00.342017
A Framework for Assessing Organisational IT Governance, Risk and Compliance.10.372017
PE-BPMN: Privacy-Enhanced Business Process Model and Notation.40.482017
Security Risk Management In The Aviation Turnaround Sector10.352016
The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes.00.342016
Securing Airline-Turnaround Processes Using Security Risk-Oriented Patterns.20.362016
A Coarse-Grained Comparison of Modelling Languages for Business Motivation and Intentional Distribution.00.342016
Selected Topics on Business Informatics Research: Editorial Introduction to Issue 6 of CSIMQ.00.342016
Criteria and Heuristics for Business Process Model Decomposition - Review and Comparative Evaluation.00.342016
Application of the Enterprise Model Frame for Security Requirements and Control Identification.00.342016
Integration of IT-Security Aspects into Information Demand Analysis and Patterns20.402015
A Model-driven Role-based Access Control for SQL Databases00.342015
Refining Security Requirement Elicitation from Business Processes using Method Engineering10.412015
An Experience Report of Improving Business Process Compliance Using Security Risk-Oriented Patterns.10.342015
Pattern-Based Security Requirements Derivation from Secure Tropos Models20.392015
Selected Topics on Enterprise and Automated Systems: Editorial Introduction to Issue 4 of CSIMQ.00.342015
Securing business processes using security risk-oriented patterns191.162014
SREBP: Security Requirement Elicitation from Business Processes.00.342014
Presentation and Validation of Method for Security Requirements Elicitation from Business Processes40.472014
A Method for Eliciting Security Requirements from the Business Process Models.00.342014
Model Comprehension and Stakeholder Appropriateness of Security Risk-Oriented Modelling Languages.00.342014
Short Paper: Role-Based Access Control for Securing Dynamically Created Documents.10.372013
Empirical Analysis of the Test Maturity Model Integration (TMMi).20.382013
Modelling Families of Business Process Variants: A Decomposition Driven Method.40.432013
Second Workshop On Security In Business Processes A Workshop Report10.342013
Eliciting Security Requirements From The Business Processes Using Security Risk-Oriented Patterns20.482013
Decomposition driven consolidation of process models70.502013
An Extension of Business Process Model and Notation for Security Risk Management.80.532013
Aligning mal-activity diagrams and security risk management for security requirements definitions110.782012
A Model Transformation from Misuse Cases to Secure Tropos.10.372012
  • 1
  • 2