Resolving vulnerability identification errors using security requirements on business process models

Journal on Information Management and Computer Security (IMCS) 2013
Volume 21, Issue 3, relevant pages 202-233