메뉴 건너뛰기




Volumn 50, Issue 5, 2008, Pages 366-374

ExPDT: A policy-based approach for automating compliance;ExPDT: Ein Policy-basierter Ansatz zur Automatisierung von Compliance

Author keywords

Automating compliance; Flexible business process management; Policy language; Risk management

Indexed keywords


EID: 57849129576     PISSN: 09376429     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11576-008-0078-1     Document Type: Article
Times cited : (37)

References (39)
  • 3
    • 57849139819 scopus 로고    scopus 로고
    • Ashley, P.; Hada, S.; Karjoth, G.; Powers, C. et al. (2003): Enterprise Privacy Authorization Language (EPAL 1.2). Submission to W3C.
    • Ashley, P.; Hada, S.; Karjoth, G.; Powers, C. et al. (2003): Enterprise Privacy Authorization Language (EPAL 1.2). Submission to W3C.
  • 4
    • 84855994877 scopus 로고    scopus 로고
    • Understanding the Components of Compliance. Gartner
    • Report G00137902
    • Bace, J.; Rozwell, C. (2006): Understanding the Components of Compliance. Gartner, Report G00137902.
    • (2006)
    • Bace, J.1    Rozwell, C.2
  • 6
    • 57849137500 scopus 로고    scopus 로고
    • Bajaj, S.; Box, D. et al. (2006): Web Services Policy 1.2 - Framework (WS-Policy). http://www.w3. org/Submission/WS-Policy/, last access 2008-06-27.
    • Bajaj, S.; Box, D. et al. (2006): Web Services Policy 1.2 - Framework (WS-Policy). http://www.w3. org/Submission/WS-Policy/, last access 2008-06-27.
  • 8
    • 57849091337 scopus 로고    scopus 로고
    • Breaux, T. D.; Anton, A. I.; Karat, C.-M.; Karat, J. (2005): Enforceability vs. Accountability In Electronic Policies. Report TR-2005-47, North Carolina State University Computer Science.
    • Breaux, T. D.; Anton, A. I.; Karat, C.-M.; Karat, J. (2005): Enforceability vs. Accountability In Electronic Policies. Report TR-2005-47, North Carolina State University Computer Science.
  • 9
    • 57849114441 scopus 로고    scopus 로고
    • Compliance deconstructed
    • Cannon, J. C.; Byers, M. (2006): Compliance deconstructed, In: CACM Queue 4 (7), pp. 30-37.
    • (2006) CACM Queue , vol.4 , Issue.7 , pp. 30-37
    • Cannon, J.C.1    Byers, M.2
  • 10
    • 57849102179 scopus 로고    scopus 로고
    • Cranor, L. F.; Dobbs, B. et al. (2006): The Platform for Privacy Preferences 1.1 (P3P1.1). W3C specification. http://www.w3.org/TR/P3P11/, last access 2008-06-27.
    • Cranor, L. F.; Dobbs, B. et al. (2006): The Platform for Privacy Preferences 1.1 (P3P1.1). W3C specification. http://www.w3.org/TR/P3P11/, last access 2008-06-27.
  • 11
    • 57849136132 scopus 로고    scopus 로고
    • Cranor, L. F.; Langheinrich, /V.; Marchiori, M. (2005): A P3P Preference Exchange Language 1.0 (APPEL). W3C Working Draft.
    • Cranor, L. F.; Langheinrich, /V).; Marchiori, M. (2005): A P3P Preference Exchange Language 1.0 (APPEL). W3C Working Draft.
  • 12
    • 34250307701 scopus 로고    scopus 로고
    • Addressing the data aspects of compliance with industry models
    • Delbaere, M.; Ferreira, R. (2007): Addressing the data aspects of compliance with industry models. In: IBM Systems Journal 46 (2), pp. 319-334.
    • (2007) IBM Systems Journal , vol.46 , Issue.2 , pp. 319-334
    • Delbaere, M.1    Ferreira, R.2
  • 14
    • 34250380218 scopus 로고    scopus 로고
    • From regulatory policies to event monitoring rules: Towards model driven compliance automation. IBM Research Zurich
    • 3662
    • Giblin, C.; Muller, S.; Pfitzmann, B. (2006): From regulatory policies to event monitoring rules: Towards model driven compliance automation. IBM Research Zurich, Report RZ 3662.
    • (2006) Report RZ
    • Giblin, C.1    Muller, S.2    Pfitzmann, B.3
  • 15
    • 33749642332 scopus 로고    scopus 로고
    • Designing Compliant Business Processes with Obligations and Permissions
    • Proceedings of International Conference on Business Process Management (BPM06) Workshops, Springer, Berlin, pp
    • Goedertier, S.; Vanthienen, J. (2006): Designing Compliant Business Processes with Obligations and Permissions. In: Proceedings of International Conference on Business Process Management (BPM06) Workshops. LNCS 4103, Springer, Berlin, pp. 5-14.
    • (2006) LNCS , vol.4103 , pp. 5-14
    • Goedertier, S.1    Vanthienen, J.2
  • 16
    • 33646071594 scopus 로고    scopus 로고
    • On Obligations
    • Proceedings of 10th European Symposium on Research in Computer Security ESORICS, Springer, Berlin, pp
    • Hilty, M.; Basin, D.; PretschnerA. (2005); On Obligations. In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS 2005). LNCS 3679, Springer, Berlin, pp. 98-117.
    • (2005) LNCS , vol.3679 , pp. 98-117
    • Hilty, M.1    Basin, D.2    PretschnerA3
  • 17
    • 17444392883 scopus 로고    scopus 로고
    • Protecting Client Privacy with Trusted Computing at the Server
    • Iliev, A.; Smith, S. (2005): Protecting Client Privacy with Trusted Computing at the Server. Proceedings of IEEE Security & Privacy 3 (2), pp. 20-28.
    • (2005) Proceedings of IEEE Security & Privacy , vol.3 , Issue.2 , pp. 20-28
    • Iliev, A.1    Smith, S.2
  • 18
    • 57849155388 scopus 로고    scopus 로고
    • ITGI (2007): COBIT 4.1, Framework, Control Objectives, Management Guidelines, Maturity Mo dels. http://www.lsaca.org/AMTemplate.cfm?S ection=Downloads&Template=/MembersOnly.cfm&ContentFileID=14002, last access 2007-12-01 (free registration required).
    • ITGI (2007): COBIT 4.1, Framework, Control Objectives, Management Guidelines, Maturity Mo dels. http://www.lsaca.org/AMTemplate.cfm?S ection=Downloads&Template=/MembersOnly.cfm&ContentFileID=14002, last access 2007-12-01 (free registration required).
  • 19
    • 34250367064 scopus 로고    scopus 로고
    • Compliance with data protection laws using Hippocratic Database active enforcement and auditing
    • Johnson, C. M.; Grandison, T.W.A. (2007): Compliance with data protection laws using Hippocratic Database active enforcement and auditing. IBM Systems Journal 46 (2), pp. 255-264.
    • (2007) IBM Systems Journal , vol.46 , Issue.2 , pp. 255-264
    • Johnson, C.M.1    Grandison, T.W.A.2
  • 20
    • 57849137499 scopus 로고    scopus 로고
    • Kähmer, M. (2007): ExPDT Ontologies and Examples. http://www.telematik.uni-freiburg.de/ mitarbeiter/kaehmer/expdt/, last access 2008-06-27.
    • Kähmer, M. (2007): ExPDT Ontologies and Examples. http://www.telematik.uni-freiburg.de/ mitarbeiter/kaehmer/expdt/, last access 2008-06-27.
  • 24
    • 38349008354 scopus 로고    scopus 로고
    • Klempt, P.; Schmidpeter, H.; Sowa, S.; Tsinas, L. (2007): Business Oriented Information Security Management - A Layered Approach. In; Proceedings of the 2nd International Symposium on Information Security (IS'07), Vilamoura, pp. 1835-1852.
    • Klempt, P.; Schmidpeter, H.; Sowa, S.; Tsinas, L. (2007): Business Oriented Information Security Management - A Layered Approach. In; Proceedings of the 2nd International Symposium on Information Security (IS'07), Vilamoura, pp. 1835-1852.
  • 26
    • 57849118861 scopus 로고    scopus 로고
    • McGuinness, D. L.; van Harmelen, F. (2004): OWL Web Ontology Language - Overview, W3C recommendation. http://www.w3.org/TR/2004/ REC-owl-features-20040210/, last access 2008.06.27.
    • McGuinness, D. L.; van Harmelen, F. (2004): OWL Web Ontology Language - Overview, W3C recommendation. http://www.w3.org/TR/2004/ REC-owl-features-20040210/, last access 2008.06.27.
  • 27
    • 57849123063 scopus 로고    scopus 로고
    • Moses, T, 2005, eXtensible Access Control Markup Language XACML, version 2.0, Oasis Standard, last access 2008-06-27
    • Moses, T. (2005): eXtensible Access Control Markup Language (XACML), version 2.0, Oasis Standard. http://xml.coverpages.org/xacml.html, last access 2008-06-27.
  • 29
    • 57849118420 scopus 로고    scopus 로고
    • Müller, G.; Sackmann, S.; Prokein, O. (2008): IT Security: New Requirements, Regulations and Approaches. In: Frank-Schlottmann, F. et al. (Eds.): Handbook on Information Technology in Finance, Springer, Berlin, pp. 711-730.
    • Müller, G.; Sackmann, S.; Prokein, O. (2008): IT Security: New Requirements, Regulations and Approaches. In: Frank-Schlottmann, F. et al. (Eds.): Handbook on Information Technology in Finance, Springer, Berlin, pp. 711-730.
  • 31
    • 57849083570 scopus 로고    scopus 로고
    • OCG (2007): ITIL V3 - Service Life Cycle, Office of Governance Commerce, http://www.itll.org/ en/itilv3-servicelifecycle/index.php, last access 2008-06-27,
    • OCG (2007): ITIL V3 - Service Life Cycle, Office of Governance Commerce, http://www.itll.org/ en/itilv3-servicelifecycle/index.php, last access 2008-06-27,
  • 32
    • 34547487459 scopus 로고    scopus 로고
    • Corporate governance of IT: A framework for development
    • Raghupathl, W. R. P. (2007): Corporate governance of IT: a framework for development. In: Communications of the ACM 50 (8), pp. 94-99.
    • (2007) Communications of the ACM , vol.50 , Issue.8 , pp. 94-99
    • Raghupathl, W.R.P.1
  • 34
    • 33746637552 scopus 로고    scopus 로고
    • An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
    • Proceedings of International Conference on Emerging Trends in Information and Communication Security ET-RICS, Springer, Berlin, pp
    • Raub, D.; Steinwandt, R. (2006): An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. In: Proceedings of International Conference on Emerging Trends in Information and Communication Security (ET-RICS), LNCS 3995, Springer, Berlin, pp. 130-144.
    • (2006) LNCS , vol.3995 , pp. 130-144
    • Raub, D.1    Steinwandt, R.2
  • 36
    • 33748532138 scopus 로고    scopus 로고
    • Sackmann, S.; Strücker, J.; Accorsi, R. (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32-38.
    • Sackmann, S.; Strücker, J.; Accorsi, R. (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32-38.
  • 37
    • 38049150939 scopus 로고    scopus 로고
    • Modeling Control Objectives for Business Process Compliance
    • Proceedings of the 5th International Conference Business Process Management BPM, Springer, Berlin, pp
    • Sadiq, S. W.; Governatori, G.; Namiri, K. (2007): Modeling Control Objectives for Business Process Compliance. In: Proceedings of the 5th International Conference Business Process Management (BPM 2007). LNCS 4714, Springer, Berlin, pp. 149-164.
    • (2007) LNCS , vol.4714 , pp. 149-164
    • Sadiq, S.W.1    Governatori, G.2    Namiri, K.3
  • 38
    • 0012889295 scopus 로고    scopus 로고
    • A Language-Based Approach to Security
    • Informatics: 10 Years Back, 10 Years Ahead, Springer, Berlin, pp
    • Schneider, F. B.; Morrisett, G.; Harper, R. (2001); A Language-Based Approach to Security. In: Informatics: 10 Years Back, 10 Years Ahead. LNCS 2000, Springer, Berlin, pp. 86-101.
    • (2001) LNCS 2000 , pp. 86-101
    • Schneider, F.B.1    Morrisett, G.2    Harper, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.