메뉴 건너뛰기




Volumn 4083 LNCS, Issue , 2006, Pages 41-50

Towards a risk management perspective on AAIs

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; RISK ASSESSMENT; SECURITY OF DATA; SOFTWARE ENGINEERING;

EID: 33750036384     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11824633_5     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 2
    • 4243109556 scopus 로고    scopus 로고
    • A model for evaluating IT security investments
    • ACM Press, New York
    • Cavusoglu, H., Mishra, B., Raghunathan, S.: A Model for Evaluating IT Security Investments. In: Communications of the ACM, Volume 47. ACM Press, New York (2004) 87-92
    • (2004) Communications of the ACM , vol.47 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 6
    • 33646534622 scopus 로고    scopus 로고
    • Trust, privacy and security in e-business: Requirements and solutions
    • Proc. of the 10th Panhellenic Conference on Informatics (PCI'2005) Springer-Verlag, Berlin Heidelberg New York
    • Katsikas, S. K., Lopez, J., Pernul, G.: Trust, Privacy and Security in E-business: Requirements and Solutions. In: Proc. of the 10th Panhellenic Conference on Informatics (PCI'2005). Lecture Notes in Computer Science. Springer-Verlag, Berlin Heidelberg New York (2005) 548-558
    • (2005) Lecture Notes in Computer Science , pp. 548-558
    • Katsikas, S.K.1    Lopez, J.2    Pernul, G.3
  • 8
    • 80052182531 scopus 로고    scopus 로고
    • Liberty Alliance Project
    • Liberty ID-FF Bindings and Profiles Specification, Liberty Alliance Project, 2003. Accessible at http://www.projectliberty.org/specs/liberty-idff- bindings-profiles-v1.2.pdf
    • (2003) Liberty ID-FF Bindings and Profiles Specification
  • 9
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and authorization infrastructures (AAIs): A comparative survey
    • Elsevier, Amsterdam
    • Lopez, J., Oppliger, R., Pernul, G.: Authentication and authorization infrastructures (AAIs): a comparative survey. In: Computers & Security, Volume 23. Elsevier, Amsterdam (2004) 578-590
    • (2004) Computers & Security , vol.23 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 10
    • 84941150906 scopus 로고    scopus 로고
    • Microsoft Passport Review Guide. Accessible at http://download.microsoft. com/download/a/f/4/af49b391-086e-4aa2-a84b-ef6d916b2f08/ passport_reviewguide. doc
    • Microsoft Passport Review Guide
  • 11
    • 33750955475 scopus 로고    scopus 로고
    • Ansätze zur evaluierung von sicherheitsinvestitionen
    • Proc. 2. Jahrestagung des GI-Fachbereichs Sicherheit, P-62, Köllen-Verlag, Bonn
    • Nowey, T., Federrath, H., Klein, C., Plössl, K.: Ansätze zur Evaluierung von Sicherheitsinvestitionen. In: Proc. 2. Jahrestagung des GI-Fachbereichs Sicherheit, Lecture Notes in Informatics, P-62, Köllen-Verlag, Bonn (2005) 15-26
    • (2005) Lecture Notes in Informatics , pp. 15-26
    • Nowey, T.1    Federrath, H.2    Klein, C.3    Plössl, K.4
  • 12
    • 0034271735 scopus 로고    scopus 로고
    • Risky business: What we have yet to learn about risk management
    • Elsevier, New York
    • Pfleeger, S.L.: Risky Business: what we have yet to learn about risk management. Journal of Systems and Software, Volume 53. Elsevier, New York (2000) 265-273
    • (2000) Journal of Systems and Software , vol.53 , pp. 265-273
    • Pfleeger, S.L.1
  • 15
    • 26844573387 scopus 로고    scopus 로고
    • Authentication and authorisation infrastructures in b2c e-commerce
    • Bauknecht, K., Pröll, B., Werthner, H. (eds.): Proc. of the Sixth International Conference on Electronic Commerce and Web Technologies - EC-Web '05. Springer Verlag, Berlin Heidelberg New York
    • Schlaeger, C., Pernul, G.: Authentication and Authorisation Infrastructures in b2c e-commerce. In: Bauknecht, K., Pröll, B., Werthner, H. (eds.): Proc. of the Sixth International Conference on Electronic Commerce and Web Technologies - EC-Web '05. Lecture Notes in Computer Science, Vol. 3590. Springer Verlag, Berlin Heidelberg New York (2005) 306-315
    • (2005) Lecture Notes in Computer Science , vol.3590 , pp. 306-315
    • Schlaeger, C.1    Pernul, G.2
  • 17
    • 33749642956 scopus 로고    scopus 로고
    • A critical discussion of risk and threat analysis methods and methodologies
    • University of Glamorgan
    • Vidalis, S.: A Critical Discussion of Risk and Threat Analysis Methods and Methodologies. School of Computing Technical Report CS-04-03, University of Glamorgan (2004)
    • (2004) School of Computing Technical Report , vol.CS-04-03
    • Vidalis, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.