-
3
-
-
51449123231
-
-
D. A. Alberts, C.J., OCTAVE Method Implementation Guideline Version 2.0 - 1: Introduction, 2001.
-
D. A. Alberts, C.J., "OCTAVE Method Implementation Guideline Version 2.0 - Volume 1: Introduction," 2001.
-
-
-
-
4
-
-
51449123684
-
-
CERT, Online, Available
-
CERT, "OCTAVE," 2005. [Online]. Available: http://www.cert.org/ octave
-
(2005)
-
-
-
6
-
-
51449122564
-
-
D. Karagiannis, S. Junginger, and R. Strobl, Business Process Modelling. Springer, Berlin, 1996, ch. Introduction to Business Process Management Systems Concepts, pp. 81-106.
-
D. Karagiannis, S. Junginger, and R. Strobl, Business Process Modelling. Springer, Berlin, 1996, ch. Introduction to Business Process Management Systems Concepts, pp. 81-106.
-
-
-
-
7
-
-
51449114315
-
-
BOC, Online, Available
-
BOC, "The BPMS Paradigm," 1996-2004. [Online]. Available: http://www.boc-eu.com/bochp.jsp?file=WP 582571cc1ed802de.b05236.f598e2482c
-
(1996)
The BPMS Paradigm
-
-
-
8
-
-
0346245772
-
Semantische Prozeßmodellierung auf der Grundlage Ereignisgesteuerter Prozeßketten (EPK)
-
Online, Available
-
A. W. Scheer, G. Keller, and M. Nüttgens, "Semantische Prozeßmodellierung auf der Grundlage Ereignisgesteuerter Prozeßketten (EPK)," Veröffentlichungen des Instituts für Wirtschaftsinformatik, Heft 89, Saarbrücken, 1992. [Online]. Available: http://www.iwi.uni-sb.de/nuettgens/Veroef/Artikel/heft089/heft089.pdf
-
(1992)
Veröffentlichungen des Instituts für Wirtschaftsinformatik, Heft 89, Saarbrücken
-
-
Scheer, A.W.1
Keller, G.2
Nüttgens, M.3
-
9
-
-
49049121750
-
Good Practice Guidelines
-
Business Continuity Institute, July, Online, Available:, http://www.thebci.org
-
Business Continuity Institute, "Good Practice Guidelines," http://www.thebci.org/gpgdownloadpage.htm, July 2007. [Online]. Available: http://www.thebci.org
-
(2007)
-
-
-
10
-
-
50349098286
-
-
BSI, Online, Available
-
BSI, "IT-Grundschutz Manual (english version)," 2004. [Online]. Available: http://www.bsi.de/english/gshb/manual/download/index.html
-
(2004)
IT-Grundschutz Manual (english version)
-
-
-
11
-
-
50349101623
-
-
International Organization for Standardization and International Electrotechnical Commission, Code of practice for information security management
-
International Organization for Standardization and International Electrotechnical Commission, "ISO/IEC 17799:2005 Information technology - Security techniques - Code of practice for information security management," http://www.iso.org/, 2006.
-
(2006)
ISO/IEC 17799:2005 Information technology - Security techniques
-
-
-
12
-
-
51449104101
-
-
British Standards Institute, Bs 25999, http://www.bsonline. bsiglobal.com/server/index.jsp, 2006.
-
British Standards Institute, "Bs 25999," http://www.bsonline. bsiglobal.com/server/index.jsp, 2006.
-
-
-
-
14
-
-
49049093296
-
ROPE: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes
-
S. Jakoubi, S. Tjoa, and G. Quirchmayr, "ROPE: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes," in ECIS, 15th European Conference on Information Systems, 2007.
-
(2007)
ECIS, 15th European Conference on Information Systems
-
-
Jakoubi, S.1
Tjoa, S.2
Quirchmayr, G.3
-
15
-
-
51449101752
-
A Methodology for the Visualisation of Risks in Business Processes as an Enabler for a Holistic Documentation and Risk Evaluation by means of Simulation for Software Projects (in German),
-
Master's thesis, University of Vienna
-
S. Jakoubi, "A Methodology for the Visualisation of Risks in Business Processes as an Enabler for a Holistic Documentation and Risk Evaluation by means of Simulation for Software Projects (in German)," Master's thesis, University of Vienna, 2006.
-
(2006)
-
-
Jakoubi, S.1
-
16
-
-
51449110638
-
A Methodology for the Enhancement of Business Process Modelling by means of Process-oriented Modelling, Evaluation, and Simulation of IT-Infrastructure (in German),
-
Master's thesis, University of Vienna
-
S. Tjoa, "A Methodology for the Enhancement of Business Process Modelling by means of Process-oriented Modelling, Evaluation, and Simulation of IT-Infrastructure (in German)," Master's thesis, University of Vienna, 2006.
-
(2006)
-
-
Tjoa, S.1
-
17
-
-
51449111518
-
-
G. Stoneburner, A. Goguen, and A. Feringa, Risk Management Guide for Information Technology Systems, NIST(National Institute of Standards and Technology), Tech. Rep., July 2002, special Publication 800-30. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
-
G. Stoneburner, A. Goguen, and A. Feringa, "Risk Management Guide for Information Technology Systems," NIST(National Institute of Standards and Technology), Tech. Rep., July 2002, special Publication 800-30. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
-
-
-
-
18
-
-
39749101462
-
Security Ontologies: Improving Quantitative Risk Analysis
-
Jan
-
A. Ekelhart, S. Fenz, M. Klemen, and E. Weippl, "Security Ontologies: Improving Quantitative Risk Analysis," in Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007), Jan 2007.
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007)
-
-
Ekelhart, A.1
Fenz, S.2
Klemen, M.3
Weippl, E.4
-
19
-
-
84992036925
-
-
_, Security Ontology: Simulating Threats to Corporate Assets, in Information Systems Security, ser. Lecture Notes in Computer Science, A. Bagchi and V. Atluri, Eds., 4332. Springer, Dec 2006, pp. 249-259.
-
_, "Security Ontology: Simulating Threats to Corporate Assets," in Information Systems Security, ser. Lecture Notes in Computer Science, A. Bagchi and V. Atluri, Eds., vol. 4332. Springer, Dec 2006, pp. 249-259.
-
-
-
-
22
-
-
51449111958
-
-
Silicon.de, IT-Sicherheit Studie, http://www.silicon.de/ downloads/siliconDEStudie IT Sicherheit2005.pdf, 2005, English title: IT security study.
-
Silicon.de, "IT-Sicherheit Studie," http://www.silicon.de/ downloads/siliconDEStudie IT Sicherheit2005.pdf, 2005, English title: IT security study.
-
-
-
-
25
-
-
51449109650
-
-
NIST, An Introduction to Computer Security - The NIST Handbook, NIST(National Institute of Standards and Technology), Tech. Rep., October 1995, special Publication 800-12. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf
-
NIST, "An Introduction to Computer Security - The NIST Handbook," NIST(National Institute of Standards and Technology), Tech. Rep., October 1995, special Publication 800-12. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf
-
-
-
-
29
-
-
12344308304
-
Basic Concepts and Taxonomy of Dependable and Secure Computing
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. E. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable Sec. Comput., vol. 1, no. 1, pp. 11-33, 2004.
-
(2004)
IEEE Trans. Dependable Sec. Comput
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.E.4
-
30
-
-
33645967666
-
-
International Organization for Standardization and International Electrotechnical Commission, information security management systemsrequirements
-
International Organization for Standardization and International Electrotechnical Commission, "ISO/IEC 27001:2005, information technology - security techniques - information security management systemsrequirements," http://www.iso.org/, 2005.
-
(2005)
ISO/IEC 27001:2005, information technology - security techniques
-
-
-
31
-
-
51449089525
-
-
ISACA
-
ISACA, "COBIT," http://www.isaca.org/, 2006.
-
(2006)
COBIT
-
-
-
32
-
-
51449101282
-
-
The Office of Government Commerce
-
The Office of Government Commerce, "ITIL," http://www.itil.co. uk/, 2006.
-
(2006)
ITIL
-
-
|