-
2
-
-
0001549664
-
Application of graph transformation to visual languages
-
Chapter 1. World Scientific
-
Bardohl, R., Taentzer, G., Minas, M., & Schürr, A. (1999). Application of graph transformation to visual languages. In Handbook on Graph Grammars and Computing by Graph Transformation, Volume 2: Applications, Languages and Tools, Chapter 1. World Scientific.
-
(1999)
Handbook on Graph Grammars and Computing By Graph Transformation, 2: Applications, Languages and Tools
-
-
Bardohl, R.1
Taentzer, G.2
Minas, M.3
Schürr, A.4
-
4
-
-
0027804413
-
Information systems design methods: Implications for information systems development
-
Baskerville, R. (1993). Information systems design methods: Implications for information systems development. ACM Computing Surveys, 25 (4), 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
8
-
-
0023327666
-
Cost-Effectiveness Modeling for a Decision Support System in Computer Security
-
Bui, T., & Sivasankaran, T. (1987). Cost-Effectiveness Modeling for a Decision Support System in Computer Security. Computer Security, 6 (2), 139-151.
-
(1987)
Computer Security
, vol.6
, Issue.2
, pp. 139-151
-
-
Bui, T.1
Sivasankaran, T.2
-
9
-
-
0040304613
-
Access control in workflow management systems
-
In Oldenbourg-Verlag Munich
-
Bußler, C. (1995). Access control in workflow management systems. In Proceedings of the IT Security'94 Conference (pp. 165-179), Oldenbourg-Verlag Munich.
-
(1995)
Proceedings of the IT Security'94 Conference
, pp. 165-179
-
-
Bußler, C.1
-
10
-
-
0021561035
-
Towards an expert system for computer facility certification
-
In Amsterdam: North-Holland
-
Carroll, J., & Maclver, W. (1984). Towards an expert system for computer facility certification. In Computer Security A Global Challenge, (pp. 293-306). Amsterdam: North-Holland
-
(1984)
Computer Security A Global Challenge
, pp. 293-306
-
-
Carroll, J.1
Maclver, W.2
-
12
-
-
0042490373
-
Applying risk analysis methods to university systems
-
Grenoble
-
Chisnall, W. R. (1997). Applying risk analysis methods to university systems. In Proceedings of the EUNIS 97 Congress, Grenoble.
-
(1997)
Proceedings of the EUNIS 97 Congress
-
-
Chisnall, W.R.1
-
16
-
-
0026923229
-
Process modeling
-
Curtis, B., Kellner, M.I., & Over, J. (1992). Process modeling. Communications of the ACM, 35 (9), 75-90.
-
(1992)
Communications of the ACM
, vol.35
, Issue.9
, pp. 75-90
-
-
Curtis, B.1
Kellner, M.I.2
Over, J.3
-
17
-
-
33749353622
-
-
Data Interchange Standards Association. release 4050 edition, December
-
Data Interchange Standards Association. (2001). X12 Standard, release 4050 edition, December.
-
(2001)
X12 Standard
-
-
-
19
-
-
33749344321
-
Computer support for information security analysis in a small business environment
-
In Jan. H.P. Eloff, (Ed.) Samos
-
Finne, T. (1996). Computer support for information security analysis in a small business environment. In Jan. H.P. Eloff, (Ed.), Proceedings of the IFIP TC11 WG 11.2 on small systems security, (pp. 73-88), Samos.
-
(1996)
Proceedings of the IFIP TC11 WG 11.2 on Small Systems Security
, pp. 73-88
-
-
Finne, T.1
-
21
-
-
0032180215
-
Anonymous mechanisms in group decision support systems communication
-
Gavish, B., & Gerdes, J. (1998). Anonymous mechanisms in group decision support systems communication. Decision Support Systems, 23 (4), 297-328.
-
(1998)
Decision Support Systems
, vol.23
, Issue.4
, pp. 297-328
-
-
Gavish, B.1
Gerdes, J.2
-
22
-
-
30744472925
-
Principles and Procedures of the LRAM Approach to Information Systems Risk Analysis and Management
-
Guarro, S. (1987). Principles and Procedures of the LRAM Approach to Information Systems Risk Analysis and Management. Computer Security, 6 (6), 493-504.
-
(1987)
Computer Security
, vol.6
, Issue.6
, pp. 493-504
-
-
Guarro, S.1
-
25
-
-
0039372661
-
Viewing business process security from different perspectives
-
Herrmann, G., & Pernul, G. (1999). Viewing business process security from different perspectives. International Journal of Electronic Commerce, 3 (3), 89-103.
-
(1999)
International Journal of Electronic Commerce
, vol.3
, Issue.3
, pp. 89-103
-
-
Herrmann, G.1
Pernul, G.2
-
26
-
-
17644369110
-
Information flow analysis of component-structured applications
-
In New Orleans: ACM SIGSAC, IEEE Computer Society Press
-
Herrmann, P. (2001). Information flow analysis of component-structured applications. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC'2001) (pp. 45-54). New Orleans: ACM SIGSAC, IEEE Computer Society Press.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC'2001)
, pp. 45-54
-
-
Herrmann, P.1
-
29
-
-
0018058216
-
SECURATE - Security evaluation and analysis using fuzzy metrics
-
In Arlington. AFIPS
-
Hoffman, L., Michelman, E., & Clements, D. (1978). SECURATE - Security evaluation and analysis using fuzzy metrics. In AFIPS Conference Proceedings of the National Computer Conference 47 (pp. 531-540). Arlington. AFIPS.
-
(1978)
AFIPS Conference Proceedings of the National Computer Conference
, vol.47
, pp. 531-540
-
-
Hoffman, L.1
Michelman, E.2
Clements, D.3
-
30
-
-
1842709005
-
The use of business process models for security design in organizations
-
In S. Katsikas & D. Gritzalis (Eds.). London: Chapman & Hall
-
Holbein, R., Teufel, S., & Bauknecht, K. (1996). The use of business process models for security design in organizations. In S. Katsikas & D. Gritzalis (Eds.). Proceedings of the IFIP TC11 conference on information systems security (pp. 13-22). London: Chapman & Hall.
-
(1996)
Proceedings of the IFIP TC11 Conference on Information Systems Security
, pp. 13-22
-
-
Holbein, R.1
Teufel, S.2
Bauknecht, K.3
-
37
-
-
0030385768
-
A security officer's workbench
-
Kwok, L.F., & Longley, D. (1996). A security officer's workbench. Computers & Security, 15 (8), 695-705.
-
(1996)
Computers & Security
, vol.15
, Issue.8
, pp. 695-705
-
-
Kwok, L.F.1
Longley, D.2
-
42
-
-
33749321037
-
Risk Quantification Problems and Bayesian Decision Support System Solutions
-
Ozier, W. (1989). Risk Quantification Problems and Bayesian Decision Support System Solutions. Information Age, 11 (4), 229-234.
-
(1989)
Information Age
, vol.11
, Issue.4
, pp. 229-234
-
-
Ozier, W.1
-
44
-
-
0013305253
-
Technologies for Multilateral Security
-
In G. Müller, & K. Rannenberg, (Eds.) Technology, Infrastructure, Economy Munich: Addison-Wesley
-
Pfitzmann, A. (1999). Technologies for Multilateral Security. In G. Müller, & K. Rannenberg, (Eds.), Multilateral security in communications, vol. 3: Technology, Infrastructure, Economy (pp. 85-91). Munich: Addison-Wesley.
-
(1999)
Multilateral Security in Communications
, vol.3
, pp. 85-91
-
-
Pfitzmann, A.1
-
45
-
-
84937564790
-
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
-
In H. Federrath, (Ed.) LNCS 2009
-
Pfitzmann, A. & Köhntopp, M. (2001). Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In H. Federrath, (Ed.), Anonymity 2000, LNCS 2009, pages 1-9.
-
(2001)
Anonymity 2000
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
46
-
-
0011702966
-
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
-
Pfitzmann, A., Pfitzmann, B., & Waidner, M. (1991). ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. In Kommunikation in Verteilten Systemen (KIVS'91), pages 451-463.
-
(1991)
Kommunikation in Verteilten Systemen (KIVS'91)
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
48
-
-
33749347717
-
Anonymization in data networks - Extensive overview of anonymization services on the internet
-
In D. Fox, & H. Reimer, (Eds.) Vieweg
-
Roessler, T. (1999). Anonymization in data networks - extensive overview of anonymization services on the internet. In D. Fox, & H. Reimer, (Eds.), Datenschutz und Datensicherheit 1999. Vieweg.
-
(1999)
Datenschutz Und Datensicherheit 1999
-
-
Roessler, T.1
-
49
-
-
84942786976
-
A Language for Modelling Secure Business Transactions
-
In IEEE Computer Society Press
-
Röhm, A., Herrmann, G., & Pernul, G. (1999). A Language for Modelling Secure Business Transactions. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC'99), (pp. 22-31). IEEE Computer Society Press.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC'99)
, pp. 22-31
-
-
Röhm, A.1
Herrmann, G.2
Pernul, G.3
-
50
-
-
0342561553
-
COPS: A Model and Infrastructure for Secure and Fair Electronic Markets
-
Röhm, A. & Pernul, G. (2000). COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. Decision Support Systems Journal, 29 (4), 343-355.
-
(2000)
Decision Support Systems Journal
, vol.29
, Issue.4
, pp. 343-355
-
-
Röhm, A.1
Pernul, G.2
-
51
-
-
84963689748
-
Modelling Secure and Fair Electronic Commerce
-
In IEEE Computer Society Press
-
Röhm, A., Pernul, G., & Herrmann, G. (1998). Modelling Secure and Fair Electronic Commerce. In Proceedings of the 14th Annual Computer Security Application Conference (ACSAC'98), (pp. 155-164). IEEE Computer Society Press.
-
(1998)
Proceedings of the 14th Annual Computer Security Application Conference (ACSAC'98)
, pp. 155-164
-
-
Röhm, A.1
Pernul, G.2
Herrmann, G.3
-
52
-
-
33749364743
-
Anonymitat als Sicherheitsmerkmal von Geschäftsprozessen
-
Diploma thesis, Department of Business Administration, University of Essen. In German
-
Rubert, M. (1999). Anonymitat als Sicherheitsmerkmal von Geschäftsprozessen. Diploma thesis, Department of Business Administration, University of Essen. In German.
-
(1999)
-
-
Rubert, M.1
-
53
-
-
0026986864
-
Access Control for Collaborative Environments
-
In ACM Press, New York
-
Shen, H., & Dewan, P. (1992). Access Control for Collaborative Environments. In Proceedings of the CSCW'92 Conference. ACM Press, New York.
-
(1992)
Proceedings of the CSCW'92 Conference
-
-
Shen, H.1
Dewan, P.2
-
54
-
-
0021535349
-
An Automated Method for Assessing the Effectiveness of Computer Security Safeguards
-
In North-Holland, Amsterdam
-
Smith, S. & Lim, J. (1984). An Automated Method for Assessing the Effectiveness of Computer Security Safeguards. In Computer Security A Global Challenge, pages 321-328. North-Holland, Amsterdam.
-
(1984)
Computer Security A Global Challenge
, pp. 321-328
-
-
Smith, S.1
Lim, J.2
-
55
-
-
33749341015
-
Business Models and their Description
-
In G. Chroust & A. Benczur (Eds.) Oldenbourg-Verlag Wien
-
Starke, G. (1994). Business Models and their Description. In G. Chroust & A. Benczur (Eds.), Workflow Management: Challenges, Paradigms, and Products (CON'94), of Schriftenreihe der österreichischen Computer Gesellschaft, vol. 76, pages 134-147. Oldenbourg-Verlag Wien.
-
(1994)
Workflow Management: Challenges, Paradigms, and Products (CON'94), of Schriftenreihe Der Österreichischen Computer Gesellschaft
, vol.76
, pp. 134-147
-
-
Starke, G.1
-
56
-
-
84961707899
-
Onion Routing Access Configurations
-
In Hilton Head, SC. IEEE Computer Society Press
-
Syverson, P. F., Reed, M. G., & Goldschlag, D. M. (2000). Onion Routing Access Configurations. In DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, pages 34-40, Hilton Head, SC. IEEE Computer Society Press.
-
(2000)
DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 34-40
-
-
Syverson, P.F.1
Reed, M.G.2
Goldschlag, D.M.3
-
58
-
-
0002841051
-
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management
-
In London: Chapman & Hall
-
Thomas, R. & Sandhu, R. (1997). Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. In Proceedings of the IFIP WG11.3 Workshop on Database Security. London: Chapman & Hall.
-
(1997)
Proceedings of the IFIP WG11.3 Workshop on Database Security
-
-
Thomas, R.1
Sandhu, R.2
-
59
-
-
33749332599
-
-
argouml.tigris.org/vision.html
-
Tigris. (2000). ArgoUML Vision. argouml.tigris.org/vision.html.
-
(2000)
ArgoUML Vision
-
-
Tigris1
-
60
-
-
0025406679
-
SPAN - A DSS for Security Plan Analysis
-
Zviran, M., Hoge, J., & Micucci, V. (1990). SPAN - a DSS for Security Plan Analysis. Computer Security, 9 (2), 153-160.
-
(1990)
Computer Security
, vol.9
, Issue.2
, pp. 153-160
-
-
Zviran, M.1
Hoge, J.2
Micucci, V.3
|