메뉴 건너뛰기




Volumn 6, Issue 3-4, 2006, Pages 305-335

Security requirement analysis of business processes

Author keywords

Business process; E Commerce; Graph rewriting; MoSSBP; Object oriented security analysis

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 33749367621     PISSN: 13895753     EISSN: 15729362     Source Type: Journal    
DOI: 10.1007/s10660-006-8677-7     Document Type: Article
Times cited : (60)

References (60)
  • 4
    • 0027804413 scopus 로고
    • Information systems design methods: Implications for information systems development
    • Baskerville, R. (1993). Information systems design methods: Implications for information systems development. ACM Computing Surveys, 25 (4), 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 8
    • 0023327666 scopus 로고
    • Cost-Effectiveness Modeling for a Decision Support System in Computer Security
    • Bui, T., & Sivasankaran, T. (1987). Cost-Effectiveness Modeling for a Decision Support System in Computer Security. Computer Security, 6 (2), 139-151.
    • (1987) Computer Security , vol.6 , Issue.2 , pp. 139-151
    • Bui, T.1    Sivasankaran, T.2
  • 9
    • 0040304613 scopus 로고
    • Access control in workflow management systems
    • In Oldenbourg-Verlag Munich
    • Bußler, C. (1995). Access control in workflow management systems. In Proceedings of the IT Security'94 Conference (pp. 165-179), Oldenbourg-Verlag Munich.
    • (1995) Proceedings of the IT Security'94 Conference , pp. 165-179
    • Bußler, C.1
  • 10
    • 0021561035 scopus 로고
    • Towards an expert system for computer facility certification
    • In Amsterdam: North-Holland
    • Carroll, J., & Maclver, W. (1984). Towards an expert system for computer facility certification. In Computer Security A Global Challenge, (pp. 293-306). Amsterdam: North-Holland
    • (1984) Computer Security A Global Challenge , pp. 293-306
    • Carroll, J.1    Maclver, W.2
  • 12
    • 0042490373 scopus 로고    scopus 로고
    • Applying risk analysis methods to university systems
    • Grenoble
    • Chisnall, W. R. (1997). Applying risk analysis methods to university systems. In Proceedings of the EUNIS 97 Congress, Grenoble.
    • (1997) Proceedings of the EUNIS 97 Congress
    • Chisnall, W.R.1
  • 17
    • 33749353622 scopus 로고    scopus 로고
    • Data Interchange Standards Association. release 4050 edition, December
    • Data Interchange Standards Association. (2001). X12 Standard, release 4050 edition, December.
    • (2001) X12 Standard
  • 19
    • 33749344321 scopus 로고    scopus 로고
    • Computer support for information security analysis in a small business environment
    • In Jan. H.P. Eloff, (Ed.) Samos
    • Finne, T. (1996). Computer support for information security analysis in a small business environment. In Jan. H.P. Eloff, (Ed.), Proceedings of the IFIP TC11 WG 11.2 on small systems security, (pp. 73-88), Samos.
    • (1996) Proceedings of the IFIP TC11 WG 11.2 on Small Systems Security , pp. 73-88
    • Finne, T.1
  • 21
    • 0032180215 scopus 로고    scopus 로고
    • Anonymous mechanisms in group decision support systems communication
    • Gavish, B., & Gerdes, J. (1998). Anonymous mechanisms in group decision support systems communication. Decision Support Systems, 23 (4), 297-328.
    • (1998) Decision Support Systems , vol.23 , Issue.4 , pp. 297-328
    • Gavish, B.1    Gerdes, J.2
  • 22
    • 30744472925 scopus 로고
    • Principles and Procedures of the LRAM Approach to Information Systems Risk Analysis and Management
    • Guarro, S. (1987). Principles and Procedures of the LRAM Approach to Information Systems Risk Analysis and Management. Computer Security, 6 (6), 493-504.
    • (1987) Computer Security , vol.6 , Issue.6 , pp. 493-504
    • Guarro, S.1
  • 25
    • 0039372661 scopus 로고    scopus 로고
    • Viewing business process security from different perspectives
    • Herrmann, G., & Pernul, G. (1999). Viewing business process security from different perspectives. International Journal of Electronic Commerce, 3 (3), 89-103.
    • (1999) International Journal of Electronic Commerce , vol.3 , Issue.3 , pp. 89-103
    • Herrmann, G.1    Pernul, G.2
  • 26
  • 30
    • 1842709005 scopus 로고    scopus 로고
    • The use of business process models for security design in organizations
    • In S. Katsikas & D. Gritzalis (Eds.). London: Chapman & Hall
    • Holbein, R., Teufel, S., & Bauknecht, K. (1996). The use of business process models for security design in organizations. In S. Katsikas & D. Gritzalis (Eds.). Proceedings of the IFIP TC11 conference on information systems security (pp. 13-22). London: Chapman & Hall.
    • (1996) Proceedings of the IFIP TC11 Conference on Information Systems Security , pp. 13-22
    • Holbein, R.1    Teufel, S.2    Bauknecht, K.3
  • 37
    • 0030385768 scopus 로고    scopus 로고
    • A security officer's workbench
    • Kwok, L.F., & Longley, D. (1996). A security officer's workbench. Computers & Security, 15 (8), 695-705.
    • (1996) Computers & Security , vol.15 , Issue.8 , pp. 695-705
    • Kwok, L.F.1    Longley, D.2
  • 42
    • 33749321037 scopus 로고
    • Risk Quantification Problems and Bayesian Decision Support System Solutions
    • Ozier, W. (1989). Risk Quantification Problems and Bayesian Decision Support System Solutions. Information Age, 11 (4), 229-234.
    • (1989) Information Age , vol.11 , Issue.4 , pp. 229-234
    • Ozier, W.1
  • 44
    • 0013305253 scopus 로고    scopus 로고
    • Technologies for Multilateral Security
    • In G. Müller, & K. Rannenberg, (Eds.) Technology, Infrastructure, Economy Munich: Addison-Wesley
    • Pfitzmann, A. (1999). Technologies for Multilateral Security. In G. Müller, & K. Rannenberg, (Eds.), Multilateral security in communications, vol. 3: Technology, Infrastructure, Economy (pp. 85-91). Munich: Addison-Wesley.
    • (1999) Multilateral Security in Communications , vol.3 , pp. 85-91
    • Pfitzmann, A.1
  • 45
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
    • In H. Federrath, (Ed.) LNCS 2009
    • Pfitzmann, A. & Köhntopp, M. (2001). Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In H. Federrath, (Ed.), Anonymity 2000, LNCS 2009, pages 1-9.
    • (2001) Anonymity 2000 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 48
    • 33749347717 scopus 로고    scopus 로고
    • Anonymization in data networks - Extensive overview of anonymization services on the internet
    • In D. Fox, & H. Reimer, (Eds.) Vieweg
    • Roessler, T. (1999). Anonymization in data networks - extensive overview of anonymization services on the internet. In D. Fox, & H. Reimer, (Eds.), Datenschutz und Datensicherheit 1999. Vieweg.
    • (1999) Datenschutz Und Datensicherheit 1999
    • Roessler, T.1
  • 50
    • 0342561553 scopus 로고    scopus 로고
    • COPS: A Model and Infrastructure for Secure and Fair Electronic Markets
    • Röhm, A. & Pernul, G. (2000). COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. Decision Support Systems Journal, 29 (4), 343-355.
    • (2000) Decision Support Systems Journal , vol.29 , Issue.4 , pp. 343-355
    • Röhm, A.1    Pernul, G.2
  • 52
    • 33749364743 scopus 로고    scopus 로고
    • Anonymitat als Sicherheitsmerkmal von Geschäftsprozessen
    • Diploma thesis, Department of Business Administration, University of Essen. In German
    • Rubert, M. (1999). Anonymitat als Sicherheitsmerkmal von Geschäftsprozessen. Diploma thesis, Department of Business Administration, University of Essen. In German.
    • (1999)
    • Rubert, M.1
  • 53
    • 0026986864 scopus 로고
    • Access Control for Collaborative Environments
    • In ACM Press, New York
    • Shen, H., & Dewan, P. (1992). Access Control for Collaborative Environments. In Proceedings of the CSCW'92 Conference. ACM Press, New York.
    • (1992) Proceedings of the CSCW'92 Conference
    • Shen, H.1    Dewan, P.2
  • 54
    • 0021535349 scopus 로고
    • An Automated Method for Assessing the Effectiveness of Computer Security Safeguards
    • In North-Holland, Amsterdam
    • Smith, S. & Lim, J. (1984). An Automated Method for Assessing the Effectiveness of Computer Security Safeguards. In Computer Security A Global Challenge, pages 321-328. North-Holland, Amsterdam.
    • (1984) Computer Security A Global Challenge , pp. 321-328
    • Smith, S.1    Lim, J.2
  • 58
    • 0002841051 scopus 로고    scopus 로고
    • Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management
    • In London: Chapman & Hall
    • Thomas, R. & Sandhu, R. (1997). Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. In Proceedings of the IFIP WG11.3 Workshop on Database Security. London: Chapman & Hall.
    • (1997) Proceedings of the IFIP WG11.3 Workshop on Database Security
    • Thomas, R.1    Sandhu, R.2
  • 59
    • 33749332599 scopus 로고    scopus 로고
    • argouml.tigris.org/vision.html
    • Tigris. (2000). ArgoUML Vision. argouml.tigris.org/vision.html.
    • (2000) ArgoUML Vision
    • Tigris1
  • 60
    • 0025406679 scopus 로고
    • SPAN - A DSS for Security Plan Analysis
    • Zviran, M., Hoge, J., & Micucci, V. (1990). SPAN - a DSS for Security Plan Analysis. Computer Security, 9 (2), 153-160.
    • (1990) Computer Security , vol.9 , Issue.2 , pp. 153-160
    • Zviran, M.1    Hoge, J.2    Micucci, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.