-
2
-
-
33749595578
-
Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology
-
IEEE Computer Society, Washington, DC
-
Agrawal, R.; Johnson, C.; Kiernan, J.; Leymann, F. (2006): Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology. In: Proceedings of the 22nd International Confeence on Data Engineering (ICDE'06). IEEE Computer Society, Washington, DC.
-
(2006)
Proceedings of the 22nd International Confeence on Data Engineering (ICDE'06)
-
-
Agrawal, R.1
Johnson, C.2
Kiernan, J.3
Leymann, F.4
-
3
-
-
57849139819
-
-
Ashley, P.; Hada, S.; Karjoth, G.; Powers, C. et al. (2003): Enterprise Privacy Authorization Language (EPAL 1.2). Submission to W3C.
-
Ashley, P.; Hada, S.; Karjoth, G.; Powers, C. et al. (2003): Enterprise Privacy Authorization Language (EPAL 1.2). Submission to W3C.
-
-
-
-
4
-
-
84855994877
-
Understanding the Components of Compliance. Gartner
-
Report G00137902
-
Bace, J.; Rozwell, C. (2006): Understanding the Components of Compliance. Gartner, Report G00137902.
-
(2006)
-
-
Bace, J.1
Rozwell, C.2
-
5
-
-
2442516401
-
Efficient comparison of enterprise privacy policies
-
Nicosia, pp
-
Backes, M.; Karjoth, G.; Bagga, W.; Schunter, M. (2004); Efficient comparison of enterprise privacy policies. In: Proceedings of ACM Symposium on Applied Computing (SAC'04), Nicosia, pp. 375-382.
-
(2004)
Proceedings of ACM Symposium on Applied Computing (SAC'04)
, pp. 375-382
-
-
Backes, M.1
Karjoth, G.2
Bagga, W.3
Schunter, M.4
-
6
-
-
57849137500
-
-
Bajaj, S.; Box, D. et al. (2006): Web Services Policy 1.2 - Framework (WS-Policy). http://www.w3. org/Submission/WS-Policy/, last access 2008-06-27.
-
Bajaj, S.; Box, D. et al. (2006): Web Services Policy 1.2 - Framework (WS-Policy). http://www.w3. org/Submission/WS-Policy/, last access 2008-06-27.
-
-
-
-
7
-
-
85011076371
-
Extending XQuery with Window Functions
-
VLDB Endowment, Vienna, pp
-
Botan, I.; Kossmann, D. et al. (2007): Extending XQuery with Window Functions. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB Endowment, Vienna, pp. 75-86.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 75-86
-
-
Botan, I.1
Kossmann, D.2
-
8
-
-
57849091337
-
-
Breaux, T. D.; Anton, A. I.; Karat, C.-M.; Karat, J. (2005): Enforceability vs. Accountability In Electronic Policies. Report TR-2005-47, North Carolina State University Computer Science.
-
Breaux, T. D.; Anton, A. I.; Karat, C.-M.; Karat, J. (2005): Enforceability vs. Accountability In Electronic Policies. Report TR-2005-47, North Carolina State University Computer Science.
-
-
-
-
9
-
-
57849114441
-
Compliance deconstructed
-
Cannon, J. C.; Byers, M. (2006): Compliance deconstructed, In: CACM Queue 4 (7), pp. 30-37.
-
(2006)
CACM Queue
, vol.4
, Issue.7
, pp. 30-37
-
-
Cannon, J.C.1
Byers, M.2
-
10
-
-
57849102179
-
-
Cranor, L. F.; Dobbs, B. et al. (2006): The Platform for Privacy Preferences 1.1 (P3P1.1). W3C specification. http://www.w3.org/TR/P3P11/, last access 2008-06-27.
-
Cranor, L. F.; Dobbs, B. et al. (2006): The Platform for Privacy Preferences 1.1 (P3P1.1). W3C specification. http://www.w3.org/TR/P3P11/, last access 2008-06-27.
-
-
-
-
11
-
-
57849136132
-
-
Cranor, L. F.; Langheinrich, /V.; Marchiori, M. (2005): A P3P Preference Exchange Language 1.0 (APPEL). W3C Working Draft.
-
Cranor, L. F.; Langheinrich, /V).; Marchiori, M. (2005): A P3P Preference Exchange Language 1.0 (APPEL). W3C Working Draft.
-
-
-
-
12
-
-
34250307701
-
Addressing the data aspects of compliance with industry models
-
Delbaere, M.; Ferreira, R. (2007): Addressing the data aspects of compliance with industry models. In: IBM Systems Journal 46 (2), pp. 319-334.
-
(2007)
IBM Systems Journal
, vol.46
, Issue.2
, pp. 319-334
-
-
Delbaere, M.1
Ferreira, R.2
-
14
-
-
34250380218
-
From regulatory policies to event monitoring rules: Towards model driven compliance automation. IBM Research Zurich
-
3662
-
Giblin, C.; Muller, S.; Pfitzmann, B. (2006): From regulatory policies to event monitoring rules: Towards model driven compliance automation. IBM Research Zurich, Report RZ 3662.
-
(2006)
Report RZ
-
-
Giblin, C.1
Muller, S.2
Pfitzmann, B.3
-
15
-
-
33749642332
-
Designing Compliant Business Processes with Obligations and Permissions
-
Proceedings of International Conference on Business Process Management (BPM06) Workshops, Springer, Berlin, pp
-
Goedertier, S.; Vanthienen, J. (2006): Designing Compliant Business Processes with Obligations and Permissions. In: Proceedings of International Conference on Business Process Management (BPM06) Workshops. LNCS 4103, Springer, Berlin, pp. 5-14.
-
(2006)
LNCS
, vol.4103
, pp. 5-14
-
-
Goedertier, S.1
Vanthienen, J.2
-
16
-
-
33646071594
-
On Obligations
-
Proceedings of 10th European Symposium on Research in Computer Security ESORICS, Springer, Berlin, pp
-
Hilty, M.; Basin, D.; PretschnerA. (2005); On Obligations. In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS 2005). LNCS 3679, Springer, Berlin, pp. 98-117.
-
(2005)
LNCS
, vol.3679
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
PretschnerA3
-
17
-
-
17444392883
-
Protecting Client Privacy with Trusted Computing at the Server
-
Iliev, A.; Smith, S. (2005): Protecting Client Privacy with Trusted Computing at the Server. Proceedings of IEEE Security & Privacy 3 (2), pp. 20-28.
-
(2005)
Proceedings of IEEE Security & Privacy
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.2
-
18
-
-
57849155388
-
-
ITGI (2007): COBIT 4.1, Framework, Control Objectives, Management Guidelines, Maturity Mo dels. http://www.lsaca.org/AMTemplate.cfm?S ection=Downloads&Template=/MembersOnly.cfm&ContentFileID=14002, last access 2007-12-01 (free registration required).
-
ITGI (2007): COBIT 4.1, Framework, Control Objectives, Management Guidelines, Maturity Mo dels. http://www.lsaca.org/AMTemplate.cfm?S ection=Downloads&Template=/MembersOnly.cfm&ContentFileID=14002, last access 2007-12-01 (free registration required).
-
-
-
-
19
-
-
34250367064
-
Compliance with data protection laws using Hippocratic Database active enforcement and auditing
-
Johnson, C. M.; Grandison, T.W.A. (2007): Compliance with data protection laws using Hippocratic Database active enforcement and auditing. IBM Systems Journal 46 (2), pp. 255-264.
-
(2007)
IBM Systems Journal
, vol.46
, Issue.2
, pp. 255-264
-
-
Johnson, C.M.1
Grandison, T.W.A.2
-
20
-
-
57849137499
-
-
Kähmer, M. (2007): ExPDT Ontologies and Examples. http://www.telematik.uni-freiburg.de/ mitarbeiter/kaehmer/expdt/, last access 2008-06-27.
-
Kähmer, M. (2007): ExPDT Ontologies and Examples. http://www.telematik.uni-freiburg.de/ mitarbeiter/kaehmer/expdt/, last access 2008-06-27.
-
-
-
-
24
-
-
38349008354
-
-
Klempt, P.; Schmidpeter, H.; Sowa, S.; Tsinas, L. (2007): Business Oriented Information Security Management - A Layered Approach. In; Proceedings of the 2nd International Symposium on Information Security (IS'07), Vilamoura, pp. 1835-1852.
-
Klempt, P.; Schmidpeter, H.; Sowa, S.; Tsinas, L. (2007): Business Oriented Information Security Management - A Layered Approach. In; Proceedings of the 2nd International Symposium on Information Security (IS'07), Vilamoura, pp. 1835-1852.
-
-
-
-
26
-
-
57849118861
-
-
McGuinness, D. L.; van Harmelen, F. (2004): OWL Web Ontology Language - Overview, W3C recommendation. http://www.w3.org/TR/2004/ REC-owl-features-20040210/, last access 2008.06.27.
-
McGuinness, D. L.; van Harmelen, F. (2004): OWL Web Ontology Language - Overview, W3C recommendation. http://www.w3.org/TR/2004/ REC-owl-features-20040210/, last access 2008.06.27.
-
-
-
-
27
-
-
57849123063
-
-
Moses, T, 2005, eXtensible Access Control Markup Language XACML, version 2.0, Oasis Standard, last access 2008-06-27
-
Moses, T. (2005): eXtensible Access Control Markup Language (XACML), version 2.0, Oasis Standard. http://xml.coverpages.org/xacml.html, last access 2008-06-27.
-
-
-
-
29
-
-
57849118420
-
-
Müller, G.; Sackmann, S.; Prokein, O. (2008): IT Security: New Requirements, Regulations and Approaches. In: Frank-Schlottmann, F. et al. (Eds.): Handbook on Information Technology in Finance, Springer, Berlin, pp. 711-730.
-
Müller, G.; Sackmann, S.; Prokein, O. (2008): IT Security: New Requirements, Regulations and Approaches. In: Frank-Schlottmann, F. et al. (Eds.): Handbook on Information Technology in Finance, Springer, Berlin, pp. 711-730.
-
-
-
-
31
-
-
57849083570
-
-
OCG (2007): ITIL V3 - Service Life Cycle, Office of Governance Commerce, http://www.itll.org/ en/itilv3-servicelifecycle/index.php, last access 2008-06-27,
-
OCG (2007): ITIL V3 - Service Life Cycle, Office of Governance Commerce, http://www.itll.org/ en/itilv3-servicelifecycle/index.php, last access 2008-06-27,
-
-
-
-
32
-
-
34547487459
-
Corporate governance of IT: A framework for development
-
Raghupathl, W. R. P. (2007): Corporate governance of IT: a framework for development. In: Communications of the ACM 50 (8), pp. 94-99.
-
(2007)
Communications of the ACM
, vol.50
, Issue.8
, pp. 94-99
-
-
Raghupathl, W.R.P.1
-
34
-
-
33746637552
-
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
-
Proceedings of International Conference on Emerging Trends in Information and Communication Security ET-RICS, Springer, Berlin, pp
-
Raub, D.; Steinwandt, R. (2006): An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. In: Proceedings of International Conference on Emerging Trends in Information and Communication Security (ET-RICS), LNCS 3995, Springer, Berlin, pp. 130-144.
-
(2006)
LNCS
, vol.3995
, pp. 130-144
-
-
Raub, D.1
Steinwandt, R.2
-
36
-
-
33748532138
-
-
Sackmann, S.; Strücker, J.; Accorsi, R. (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32-38.
-
Sackmann, S.; Strücker, J.; Accorsi, R. (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32-38.
-
-
-
-
37
-
-
38049150939
-
Modeling Control Objectives for Business Process Compliance
-
Proceedings of the 5th International Conference Business Process Management BPM, Springer, Berlin, pp
-
Sadiq, S. W.; Governatori, G.; Namiri, K. (2007): Modeling Control Objectives for Business Process Compliance. In: Proceedings of the 5th International Conference Business Process Management (BPM 2007). LNCS 4714, Springer, Berlin, pp. 149-164.
-
(2007)
LNCS
, vol.4714
, pp. 149-164
-
-
Sadiq, S.W.1
Governatori, G.2
Namiri, K.3
-
38
-
-
0012889295
-
A Language-Based Approach to Security
-
Informatics: 10 Years Back, 10 Years Ahead, Springer, Berlin, pp
-
Schneider, F. B.; Morrisett, G.; Harper, R. (2001); A Language-Based Approach to Security. In: Informatics: 10 Years Back, 10 Years Ahead. LNCS 2000, Springer, Berlin, pp. 86-101.
-
(2001)
LNCS 2000
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
|