메뉴 건너뛰기




Volumn , Issue , 2008, Pages 231-236

Objective types for the valuation of secure business processes

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS PROCESSES; MULTIPLE OBJECTIVES;

EID: 51349155670     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIS.2008.64     Document Type: Conference Paper
Times cited : (6)

References (23)
  • 1
    • 33750941071 scopus 로고    scopus 로고
    • Viren, Würmer, kriminelle Mitarbeiter - Deutschland hat Nachholbedarf bei IT-Security.
    • W. Alms. Viren, Würmer, kriminelle Mitarbeiter - Deutschland hat Nachholbedarf bei IT-Security. Information Management & Consulting, 17, 2002.
    • (2002) Information Management & Consulting , vol.17
    • Alms, W.1
  • 2
    • 3042782049 scopus 로고    scopus 로고
    • What is computer security?
    • Jan.-Feb
    • M. Bishop. What is computer security? IEEE Sec. Priv. Mag., 1(1):67-69, Jan.-Feb. 2003.
    • (2003) IEEE Sec. Priv. Mag , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 6
    • 33750937974 scopus 로고    scopus 로고
    • Security and integrity requirements of business processes - analysis and approach to support their realisation
    • G. Herrmann. Security and integrity requirements of business processes - analysis and approach to support their realisation. In Consortium on Advanced Information Systems Engineering, pages 36-47, 1999.
    • (1999) Consortium on Advanced Information Systems Engineering , pp. 36-47
    • Herrmann, G.1
  • 7
    • 0242403961 scopus 로고    scopus 로고
    • Umlsec: Extending UML for secure systems development
    • Springer
    • J. Jürjens. Umlsec: Extending UML for secure systems development. In UML 2002. Springer, 2002.
    • (2002) UML 2002
    • Jürjens, J.1
  • 8
    • 0002096587 scopus 로고    scopus 로고
    • UML 2001: A standardization Odyssey
    • C. Kobryn. UML 2001: A standardization Odyssey. Commun. ACM, 42(10):29-37, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.10 , pp. 29-37
    • Kobryn, C.1
  • 17
    • 84991269825 scopus 로고    scopus 로고
    • The fundamentals of information security
    • 15-16, Jan.-Feb
    • C. Pfleeger. The fundamentals of information security. IEEE Software, 14(1): 15-16,60, Jan.-Feb. 1997.
    • (1997) IEEE Software , vol.14 , Issue.1 , pp. 60
    • Pfleeger, C.1
  • 21
    • 34548800168 scopus 로고    scopus 로고
    • How much is enough? A risk-management approach to computer security
    • Technical report, Consortium for Research on Information Security and Policy CRISP, June
    • K. J. SooHoo. How much is enough? A risk-management approach to computer security. Technical report, Consortium for Research on Information Security and Policy (CRISP), June 2000.
    • (2000)
    • SooHoo, K.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.