메뉴 건너뛰기




Volumn 56, Issue 4, 2005, Pages 361-370

Collaborative business and data privacy: Toward a cyber-control?

Author keywords

Data privacy; Process models; Security; Virtual enterprise

Indexed keywords

BUSINESS PROCESS (BP) ORGANIZATION; PROCESS MODELS; SECURITY; VIRTUAL ENTERPRISES;

EID: 33644511399     PISSN: 01663615     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compind.2005.01.004     Document Type: Article
Times cited : (10)

References (32)
  • 1
    • 33644538463 scopus 로고    scopus 로고
    • Specification and verification of secure business transaction systems
    • Proceedings of the SOFSEM'2002
    • V.S. Alagar, K. Periyasamy, Specification and verification of secure business transaction systems, in: Proceedings of the SOFSEM'2002, Lecture Notes in Computer Science 2540 (2002) 240-252.
    • (2002) Lecture Notes in Computer Science , vol.2540 , pp. 240-252
    • Alagar, V.S.1    Periyasamy, K.2
  • 4
    • 33644553339 scopus 로고    scopus 로고
    • Security in business process engineering
    • Proceedings of the BPM'2003
    • M. Backes, B. Pfitzmann, M. Waidner, Security in business process engineering, in: Proceedings of the BPM'2003, Lecture Notes in Computer Science 2678 (2003) 168-183.
    • (2003) Lecture Notes in Computer Science , vol.2678 , pp. 168-183
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 6
    • 27944453007 scopus 로고    scopus 로고
    • Security integration in inter-enterprise business process engineering
    • H.S. Jagdev J.C. Wortmann H.J. Pels Kluwer Academic Publishers
    • F. Biennier Security integration in inter-enterprise business process engineering H.S. Jagdev J.C. Wortmann H.J. Pels Collaborative Systems for Production Management 2002 Kluwer Academic Publishers 207 218
    • (2002) Collaborative Systems for Production Management , pp. 207-218
    • Biennier, F.1
  • 7
    • 84902485471 scopus 로고    scopus 로고
    • Collaborative BP engineering in alliances of SMEs
    • L. Camarinha-Matos H. Afsarmanesh Kluwer Academic Publishers
    • F. Biennier, and J. Favrel Collaborative BP engineering in alliances of SMEs L. Camarinha-Matos H. Afsarmanesh Processes and Foundations for Virtual Organizations 2002 Kluwer Academic Publishers 441 448
    • (2002) Processes and Foundations for Virtual Organizations , pp. 441-448
    • Biennier, F.1    Favrel, J.2
  • 8
    • 0036713721 scopus 로고    scopus 로고
    • The application of workflow technology in semantic B2B integration
    • C. Bussler The application of workflow technology in semantic B2B integration Distributed and Parallel Databases 12 2002 163 191
    • (2002) Distributed and Parallel Databases , vol.12 , pp. 163-191
    • Bussler, C.1
  • 9
    • 0034165704 scopus 로고    scopus 로고
    • Modelling and managing interactions among business processes
    • F. Cassati, and A. Discenza Modelling and managing interactions among business processes Journal of Systems Integration 10 2001 145 168
    • (2001) Journal of Systems Integration , vol.10 , pp. 145-168
    • Cassati, F.1    Discenza, A.2
  • 10
    • 33644556378 scopus 로고
    • Language for Description and Functionnal Specification (SDL)
    • vol. VI.10 Advices Z.100 to Z.104
    • CCITT Red Book, vol. VI.10, Language for Description and Functionnal Specification (SDL), Advices Z.100 to Z.104, 1985.
    • (1985) CCITT Red Book
  • 11
    • 84888789125 scopus 로고
    • Trusted computer security evaluation criteria-orange book
    • Department of Defence (DoD), Trusted Computer Security Evaluation Criteria-Orange Book, DOD 5200.28-STD Report, 1985.
    • (1985) DOD 5200.28-STD Report
  • 16
    • 0030408473 scopus 로고    scopus 로고
    • Security issues in the virtual corporation
    • R.L. Franck Security issues in the virtual corporation Computers and Security 15 1996 471 476
    • (1996) Computers and Security , vol.15 , pp. 471-476
    • Franck, R.L.1
  • 17
    • 84888793930 scopus 로고    scopus 로고
    • 1998 Report
    • FTC (Federal Trade Commission), Privacy online: a report to Congress, 1998 Report, 1998. Available at http://www.ftc.gov/reports/privacy3/priv-23.htm.
    • (1998) Privacy Online: A Report to Congress
  • 19
    • 0036779153 scopus 로고    scopus 로고
    • AutoWF - A secure web workflow system using autonomous objects
    • E. Gudes, and A. Tubman AutoWF - a secure web workflow system using autonomous objects Data and Knowledge Engineering 43 2002 1 27
    • (2002) Data and Knowledge Engineering , vol.43 , pp. 1-27
    • Gudes, E.1    Tubman, A.2
  • 21
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending uml for secure systems development
    • Proceedings of the UML'2002
    • J. Jürjens, UMLsec: extending uml for secure systems development, in: Proceedings of the UML'2002, Lecture Notes in Computer Science 2460 (2002) 412-425.
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 22
    • 0030708384 scopus 로고    scopus 로고
    • The ISSO must understand the business and management environment
    • G. Kovacich The ISSO must understand the business and management environment Computer and security 16 1997 321 326
    • (1997) Computer and Security , vol.16 , pp. 321-326
    • Kovacich, G.1
  • 24
    • 0034318674 scopus 로고    scopus 로고
    • The application of security policy to role-based access control and the common data security architecture
    • A. Lin, and R. Brown The application of security policy to role-based access control and the common data security architecture Communication 23 2000 1584 1593
    • (2000) Communication , vol.23 , pp. 1584-1593
    • Lin, A.1    Brown, R.2
  • 25
    • 0001794821 scopus 로고    scopus 로고
    • Is empowerment just a fad ? Control, decision making and IT
    • T.W. Malone Is empowerment just a fad ? Control, decision making and IT Sloan Management Review 1997 23 35
    • (1997) Sloan Management Review , pp. 23-35
    • Malone, T.W.1
  • 27
    • 33644537557 scopus 로고    scopus 로고
    • Structured risk analysis
    • Proceedings of the InfraSec'2002
    • N. Mc Evoy, A. Whitcombe, Structured risk analysis, in: Proceedings of the InfraSec'2002, Lecture Notes in Computer Science 2437 (2002) 88-103.
    • (2002) Lecture Notes in Computer Science , vol.2437 , pp. 88-103
    • Mc Evoy, N.1    Whitcombe, A.2
  • 28
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B.C. Neuman, and T. Ts'o Kerberos: an authentication service for computer networks IEEE Communications 32 9 1994 33 38
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 29
    • 0347622255 scopus 로고    scopus 로고
    • Web services and business transactions. World Wide Web
    • M.P. Papazoglou Web services and business transactions. World Wide Web Internet and Web Information Systems 6 2003 49 91
    • (2003) Internet and Web Information Systems , vol.6 , pp. 49-91
    • Papazoglou, M.P.1
  • 30
  • 32
    • 84888785339 scopus 로고    scopus 로고
    • US Department of Commerce, Safe Harbor Workbook 2003, Available at http://www.export.gov/safeharbor/sh_workbook.html.
    • Safe Harbor Workbook 2003


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.