-
1
-
-
0007840241
-
Workflow Management Systeme: Ein Beitrag der IT zur Geschäftsprozess-Orientierung & -Optimierang - Grundlagen, Standards und Trends
-
Springer
-
C. Hastedt-Marckwardt, "Workflow Management Systeme: Ein Beitrag der IT zur Geschäftsprozess-Orientierung & -Optimierang - Grundlagen, Standards und Trends," in Informatik Spektrum. Springer, 1999, vol. 22, pp. 99-109.
-
(1999)
Informatik Spektrum
, vol.22
, pp. 99-109
-
-
Hastedt-Marckwardt, C.1
-
2
-
-
84911974729
-
Business process management: A boundaryless approach to modern competitiveness
-
M. Zairi, "Business process management: a boundaryless approach to modern competitiveness," Business Process Management, vol. 3, no. 1. pp. 64-80, 1997.
-
(1997)
Business Process Management
, vol.3
, Issue.1
, pp. 64-80
-
-
Zairi, M.1
-
3
-
-
0037238281
-
The complementary use of idef and uml modelling approaches
-
C. H. Han, R. H. Westen, A. Hodgson, and K. H. Lee, "The complementary use of idef and uml modelling approaches," Computers in Industry, vol. 50, pp. 35-56, 2003.
-
(2003)
Computers in Industry
, vol.50
, pp. 35-56
-
-
Han, C.H.1
Westen, R.H.2
Hodgson, A.3
Lee, K.H.4
-
4
-
-
33750957085
-
-
T Neubauer, M. Klemen, and S. Biffl, Secure business process management: a roadmap, in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
-
T Neubauer, M. Klemen, and S. Biffl, "Secure business process management: a roadmap," in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
-
-
-
-
5
-
-
49049091471
-
Hackers prey on our insecurities, The Wall Street Journal
-
February
-
P. Kedrosky, "Hackers prey on our insecurities," The Wall Street Journal. The Wall Street Journal, February 2000.
-
(2000)
The Wall Street Journal
-
-
Kedrosky, P.1
-
6
-
-
34748877424
-
-
Online, Available
-
Computer economics. [Online]. Available: www.computereconomics.com
-
Computer economics
-
-
-
7
-
-
3042782049
-
What is computer security?
-
Jan.-Feb
-
M. Bishop, "What is computer security?" IEEE Sec. Priv. Mag., vol. 1, no, 1, pp. 67-69, Jan.-Feb. 2003.
-
(2003)
IEEE Sec. Priv. Mag
, vol.1
, Issue.1
, pp. 67-69
-
-
Bishop, M.1
-
9
-
-
0002096587
-
Uml 2001: A standardization odyssey
-
C. Kobryn, "Uml 2001: a standardization odyssey," Commun. ACM, vol. 42, no. 10, pp. 29-37, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.10
, pp. 29-37
-
-
Kobryn, C.1
-
11
-
-
0242403961
-
Umlsec: Extending uml for secure systems development
-
Springer
-
J. Jürjens, "Umlsec: Extending uml for secure systems development," in UML 2002. Springer, 2002.
-
(2002)
UML 2002
-
-
Jürjens, J.1
-
12
-
-
33750940979
-
Security requirements with a uml 2 profile
-
A. Rodriguez, E. Fernandez-Medina, and M. Piattini, "Security requirements with a uml 2 profile," in Procs. First International Conference on Availability, Reliability and Security, ARES'06, 2006.
-
(2006)
Procs. First International Conference on Availability, Reliability and Security, ARES'06
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
14
-
-
33750937974
-
Security and integrity requirements of business processes - analysis and approach to support their realisation
-
G. Herrmann, "Security and integrity requirements of business processes - analysis and approach to support their realisation," in Consortium on Advanced Information Systems Engineering, 1999, pp. 36-47.
-
(1999)
Consortium on Advanced Information Systems Engineering
, pp. 36-47
-
-
Herrmann, G.1
-
15
-
-
84991269825
-
-
C. Pfleeger, The fundamentals of information security, IEEE Softw., 14, no, 1, pp. 15-16,60, Jan.-Feb. 1997.
-
C. Pfleeger, "The fundamentals of information security," IEEE Softw., vol. 14, no, 1, pp. 15-16,60, Jan.-Feb. 1997.
-
-
-
-
17
-
-
49049084951
-
-
FIPS Publication (65), National Institute of Standards and Technologies Std., 1979.
-
FIPS Publication (65), National Institute of Standards and Technologies Std., 1979.
-
-
-
-
18
-
-
33750953084
-
-
T. Neubauer, C. Stummer, and E. Weippl, Workshop-based multiobjective security safeguard selection, in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
-
T. Neubauer, C. Stummer, and E. Weippl, "Workshop-based multiobjective security safeguard selection," in Procs. The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 20-22 April 2006, p. 8.
-
-
-
-
19
-
-
34548800168
-
How much is enough? A risk-management approach to computer security
-
Consortium for Research on Information Security and Policy CRISP, Tech. Rep, June
-
K. J. SooHoo, "How much is enough? A risk-management approach to computer security," Consortium for Research on Information Security and Policy (CRISP), Tech. Rep., June 2000,
-
(2000)
-
-
SooHoo, K.J.1
-
20
-
-
0032632088
-
Computer security - what should you spend your money on?
-
K. Buzzard, "Computer security - what should you spend your money on?" Computers and Security, vol. 18, pp. 322-334, 1999.
-
(1999)
Computers and Security
, vol.18
, pp. 322-334
-
-
Buzzard, K.1
-
21
-
-
0037252218
-
Good-enough security
-
R. Sandhu, "Good-enough security," IEEE Internet Comput., vol. 7, no. 1, pp. 66-68, 2003.
-
(2003)
IEEE Internet Comput
, vol.7
, Issue.1
, pp. 66-68
-
-
Sandhu, R.1
-
23
-
-
84949747356
-
An authorization model for workflows
-
Rome, Italy
-
V. Atluri and W.-K. Huang, "An authorization model for workflows," in Proceedings of the Fifth European Symposium on Research in Computer Security, Rome, Italy, 1996, pp. 44-64.
-
(1996)
Proceedings of the Fifth European Symposium on Research in Computer Security
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
24
-
-
3042511452
-
An authorization and access control model for workflow
-
S. Chaari, F. Biennier, C. Ben Amar, and J. Favrel, "An authorization and access control model for workflow," in IEEE Procs. First International Symposium on Control, Communications and Signal Processing, 2004., 2004, pp. 141-148.
-
(2004)
IEEE Procs. First International Symposium on Control, Communications and Signal Processing, 2004
, pp. 141-148
-
-
Chaari, S.1
Biennier, F.2
Ben Amar, C.3
Favrel, J.4
-
25
-
-
27844548810
-
A conditioned secure access control model based on multi-weighted roles in workflow systems
-
Budapest, Hungary, 27-29 June
-
J. Zhang, J. Sun, N. Li, and C. Hu, "A conditioned secure access control model based on multi-weighted roles in workflow systems," in International Conference on Control and Automation (ICCA2005), Budapest, Hungary, 27-29 June 2005.
-
(2005)
International Conference on Control and Automation (ICCA2005)
-
-
Zhang, J.1
Sun, J.2
Li, N.3
Hu, C.4
-
27
-
-
84994725444
-
Business process-based valuation of it-security
-
New York, NY, USA: ACM Press
-
T. Neubauer, M. Klemen, and S. Biffl, "Business process-based valuation of it-security," in Procs. The seventh international workshop on Economics-driven software engineering research, 2005. EDSER 2005. New York, NY, USA: ACM Press, 2005, pp. 1-5.
-
(2005)
Procs. The seventh international workshop on Economics-driven software engineering research, 2005. EDSER 2005
, pp. 1-5
-
-
Neubauer, T.1
Klemen, M.2
Biffl, S.3
-
28
-
-
49049119407
-
Information Security: An Integrated Collection of Essays
-
H. J. Podell, Ed
-
M. D. Abrams and S. Jajodia, Information Security: An Integrated Collection of Essays, H. J. Podell, Ed. IEEE Computer Society Press, 1995.
-
(1995)
IEEE Computer Society Press
-
-
Abrams, M.D.1
Jajodia, S.2
-
29
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 01, no. 1, pp. 11-33, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
30
-
-
0242665376
-
Information security is information risk management
-
New York, NY, USA: ACM Press
-
B. Blakley, E. McDermott, and D. Geer, "Information security is information risk management," in NSPW '01: Proceedings of the 2001 workshop on New security paradigms. New York, NY, USA: ACM Press, 2001, pp. 97-104.
-
(2001)
NSPW '01: Proceedings of the 2001 workshop on New security paradigms
, pp. 97-104
-
-
Blakley, B.1
McDermott, E.2
Geer, D.3
-
31
-
-
0034159453
-
Information systems risk management: Key concepts and business processes
-
T. Finne, "Information systems risk management: Key concepts and business processes," Computers and Security, vol. 19, pp. 234-242, 2000.
-
(2000)
Computers and Security
, vol.19
, pp. 234-242
-
-
Finne, T.1
-
32
-
-
84990029315
-
The economics of information security investment
-
L. A. Gordon and M. P. Loeb, "The economics of information security investment," ACM Transactions on Information Systems Security, vol. 5, no, 4, pp. 438-457, 2002,
-
(2002)
ACM Transactions on Information Systems Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
33
-
-
0042491747
-
Computer security
-
C. Landwehr, "Computer security," International Journal of Information Security, vol. 1, no. 1, pp. 3-13, 2001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 3-13
-
-
Landwehr, C.1
-
35
-
-
49049101195
-
Using process models to analyze security requirements,
-
Ph.D. dissertation, Wirtschaftswissenschaftliche Fakultät der Universität Zürich, Mar
-
S. Rohrig, "Using process models to analyze security requirements," Ph.D. dissertation, Wirtschaftswissenschaftliche Fakultät der Universität Zürich, Mar, 2003.
-
(2003)
-
-
Rohrig, S.1
-
36
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
L. D. Bodin, L. A. Gordon, and M. P. Loeb, "Evaluating information security investments using the analytic hierarchy process," Commun. ACM, vol. 48, no. 2, pp. 78-83, 2005,
-
(2005)
Commun. ACM
, vol.48
, Issue.2
, pp. 78-83
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
37
-
-
0031355379
-
Enforcing mandatory and discretionary security in workflow management systems
-
V. Atluri and W.-K. Huang, "Enforcing mandatory and discretionary security in workflow management systems," Journal of Computer Security, vol. 5, no. 4, pp. 303-339, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.4
, pp. 303-339
-
-
Atluri, V.1
Huang, W.-K.2
-
38
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, "A logical framework for reasoning about access control models," ACM Trans. Inf. Syst. Secur., vol. 6, no. 1, pp. 71-127, 2003,
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
39
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
40
-
-
77953869067
-
Pres: A practical flexible rbac workflow system
-
New York, NY, USA: ACM Press
-
Y. Sun and P. Pan, "Pres: a practical flexible rbac workflow system," in Proceedings of the 7th international conference on Electronic commerce, ICEC '05. New York, NY, USA: ACM Press, 2005, pp. 653-658.
-
(2005)
Proceedings of the 7th international conference on Electronic commerce, ICEC '05
, pp. 653-658
-
-
Sun, Y.1
Pan, P.2
-
41
-
-
0348209180
-
W-rbac: A workflow security model incorporating controlled overriding of constraints
-
J. Wainer, P. Barthelmess, and A. Kumar, "W-rbac: A workflow security model incorporating controlled overriding of constraints," International Journal of Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, 2003.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
42
-
-
33746567089
-
-
B. Wang, S. Zhang, and X. Xiawa, Grid and Cooperative Computing, ser LNCS. Springer Berlin/Heidelberg, 2004, ch. The Application Research of Role-Based Access Control Model in Workflow Management System, pp. 1034-1037.
-
B. Wang, S. Zhang, and X. Xiawa, Grid and Cooperative Computing, ser LNCS. Springer Berlin/Heidelberg, 2004, ch. The Application Research of Role-Based Access Control Model in Workflow Management System, pp. 1034-1037.
-
-
-
-
44
-
-
49049111712
-
Integration von Public-Key-Mechanismen in Petri-Netz-Workflows
-
K. Bauknecht and S. Teufel, Eds, Oct
-
K. Knorr and H. Weidner, "Integration von Public-Key-Mechanismen in Petri-Netz-Workflows," in Sicherheit in Informationssysteme SIS 2000, K. Bauknecht and S. Teufel, Eds., Oct. 2000, pp. 202-220.
-
(2000)
Sicherheit in Informationssysteme SIS 2000
, pp. 202-220
-
-
Knorr, K.1
Weidner, H.2
-
45
-
-
84955590178
-
Analyzing separation of duties in petri net workflows
-
London, UK: Springer-Verlag
-
_, "Analyzing separation of duties in petri net workflows," in Proceedings of the International Workshop on Information Assurance in Computer Networks, MMM-ACNS '01. London, UK: Springer-Verlag, 2001, pp. 102-114,
-
(2001)
Proceedings of the International Workshop on Information Assurance in Computer Networks, MMM-ACNS '01
, pp. 102-114
-
-
Knorr, K.1
Weidner, H.2
-
46
-
-
0036036577
-
Security attribute evaluation method: A cost-benefit approach
-
New York, NY, USA: ACM Press
-
S. A. Butler, "Security attribute evaluation method: a cost-benefit approach," in Proceedings of the 24th International Conference on Software Engineering, ICSE '02. New York, NY, USA: ACM Press, 2002, pp. 232-240,
-
(2002)
Proceedings of the 24th International Conference on Software Engineering, ICSE '02
, pp. 232-240
-
-
Butler, S.A.1
-
47
-
-
0005330416
-
Multi-attribute risk assessment
-
Raleigh, NC, Oct
-
S. A. Butler and P. Fischbeck, "Multi-attribute risk assessment," in Second Symposium on Requirements Engineering for Information Security, SREIS 2002, Raleigh, NC, Oct. 2002.
-
(2002)
Second Symposium on Requirements Engineering for Information Security, SREIS 2002
-
-
Butler, S.A.1
Fischbeck, P.2
-
49
-
-
0141919268
-
The is risk analysis based on a business model
-
B. Suh and I. Han, "The is risk analysis based on a business model," Inf. Manage., vol. 41, no. 2, pp. 149-158, 2003.
-
(2003)
Inf. Manage
, vol.41
, Issue.2
, pp. 149-158
-
-
Suh, B.1
Han, I.2
-
50
-
-
33947368645
-
Model-based security analysis in seven steps - a guided tour to the CORAS method
-
Jan
-
F. den Braber, I. Hogganvik, M. S. Lund, K. Stolen, and F. Vraalsen, "Model-based security analysis in seven steps - a guided tour to the CORAS method," BT Technology Journal, vol. 25, no. 1, pp. 101-117, Jan. 2007.
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
den Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stolen, K.4
Vraalsen, F.5
-
51
-
-
33745471209
-
Model driven security: From uml models to access control infrastructures
-
January
-
D. Basin, J. Doser, and T. Lodderstedt, "Model driven security: From uml models to access control infrastructures," ACM Trans. Softw. Eng. Methodol., vol. 15, no. 1, pp. 39-91, January 2006.
-
(2006)
ACM Trans. Softw. Eng. Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
52
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
6-10 Dec
-
J. McDermott and C. Fox, "Using abuse case models for security requirements analysis," in Procs. 15th Annual Computer Security Applications Conference, 1999. (ACSAC '99), 6-10 Dec, 1999, pp. 55-64.
-
(1999)
Procs. 15th Annual Computer Security Applications Conference, 1999. (ACSAC '99)
, pp. 55-64
-
-
McDermott, J.1
Fox, C.2
-
53
-
-
0034497420
-
-
G. Sindre and A. Opdahl, Eliciting security requirements by misuse cases, in Procs. 37th International Conference onTechnology of Object-Oriented Languages and Systems, 2000. TOOLS-Pacific 2000., 20-23 Nov. 2000, pp. 120-131.
-
G. Sindre and A. Opdahl, "Eliciting security requirements by misuse cases," in Procs. 37th International Conference onTechnology of Object-Oriented Languages and Systems, 2000. TOOLS-Pacific 2000., 20-23 Nov. 2000, pp. 120-131.
-
-
-
-
54
-
-
33749367621
-
Security requirement analysis of business processes
-
P. Herrmann and G. Herrmann, "Security requirement analysis of business processes," Electronic Commerce Research, vol. 6, no. 3-4, pp. 305-335, 2006.
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.3-4
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
55
-
-
77953791271
-
Formal threat descriptions for enhancing governmental risk assessment
-
ACM Press
-
A. Ekelhart, S. Fenz, T. Neubauer, and E. Weippl, "Formal threat descriptions for enhancing governmental risk assessment," in Proceedings of the First International Conference on Theory and Practice of Electronic Governance. ACM Press, 2007.
-
(2007)
Proceedings of the First International Conference on Theory and Practice of Electronic Governance
-
-
Ekelhart, A.1
Fenz, S.2
Neubauer, T.3
Weippl, E.4
-
57
-
-
33750953661
-
Collaborative requirements negotiation with easywin-win
-
Washington, DC, USA: IEEE Computer Society
-
P. Gruenbacher, "Collaborative requirements negotiation with easywin-win," in Procs. 11th International Workshop on Database and Expert Systems Applications DEXA '00. Washington, DC, USA: IEEE Computer Society, 2000, p. 954.
-
(2000)
Procs. 11th International Workshop on Database and Expert Systems Applications DEXA '00
, pp. 954
-
-
Gruenbacher, P.1
|