메뉴 건너뛰기




Volumn 244, Issue , 2009, Pages 27-39

S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System

Author keywords

Healthcare System; Organization; Pattern Deployment; Security Dependability Patterns

Indexed keywords

DEPENDABILITY ISSUES; DEPLOYMENT PROCESS; EMERGENCY SCENARIO; ENTERPRISE ARCHITECTURE; HEALTHCARE SYSTEM; IT SYSTEM; ORGANIZATION; ORGANIZATIONAL LEVELS; ORGANIZATIONAL PATTERN; ORGANIZATIONAL SETTING; PATTERN DEPLOYMENT; SECURITY INCIDENT; UNDERLYING SYSTEMS;

EID: 67651152906     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2009.07.036     Document Type: Article
Times cited : (4)

References (18)
  • 3
    • 34548045316 scopus 로고    scopus 로고
    • How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
    • Compagna, L., P. E. Khoury, F. Massacci, R. Thomas and N. Zannone, How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach, in: Proc. of ICAIL'07 (2007), pp. 149-154
    • (2007) Proc. of ICAIL'07 , pp. 149-154
    • Compagna, L.1    Khoury, P.E.2    Massacci, F.3    Thomas, R.4    Zannone, N.5
  • 6
    • 84924413055 scopus 로고    scopus 로고
    • Security and Trust Requirements Engineering
    • Foundations of Security Analysis and Design III, Springer
    • Giorgini P., Massacci F., and Zannone N. Security and Trust Requirements Engineering. Foundations of Security Analysis and Design III. LNCS 3655 (2005), Springer 237-272
    • (2005) LNCS , vol.3655 , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 8
    • 33644597751 scopus 로고    scopus 로고
    • Adaptive and fault tolerant medical vest for life-critical medical monitoring
    • Jafari, R., F. Dabiri, P. Brisk and M. Sarrafzadeh, Adaptive and fault tolerant medical vest for life-critical medical monitoring, in: Proc. of SAC'05 (2005), pp. 272-279
    • (2005) Proc. of SAC'05 , pp. 272-279
    • Jafari, R.1    Dabiri, F.2    Brisk, P.3    Sarrafzadeh, M.4
  • 9
    • 67651183472 scopus 로고    scopus 로고
    • Russian accused of citibank computer fraud
    • August 18
    • Johnston, D., Russian accused of citibank computer fraud, The New York Times (August 18, 2007)
    • (2007) The New York Times
    • Johnston, D.1
  • 11
    • 33745295147 scopus 로고    scopus 로고
    • Applying Security Engineering to Build Security Countermeasures: An Introduction
    • Proc. of PARA'04
    • Kim T.-H., and yeol Kwon H. Applying Security Engineering to Build Security Countermeasures: An Introduction. Proc. of PARA'04. LNCS 3732 (2004) 957-963
    • (2004) LNCS , vol.3732 , pp. 957-963
    • Kim, T.-H.1    yeol Kwon, H.2
  • 14
    • 85023009798 scopus 로고    scopus 로고
    • Requirements Engineering: A Roadmap
    • Nuseibeh, B. and S. Easterbrook, Requirements Engineering: a Roadmap, in: Proc. of ICSE'00 (2000), pp. 35-46
    • (2000) Proc. of ICSE'00 , pp. 35-46
    • Nuseibeh, B.1    Easterbrook, S.2
  • 17
    • 33750069781 scopus 로고    scopus 로고
    • Architectural Patterns for Enabling Application Security
    • Yoder, J. and J. Barcalow, Architectural Patterns for Enabling Application Security, in: Proc. of PLoP'97, 1997
    • (1997) Proc. of PLoP'97
    • Yoder, J.1    Barcalow, J.2
  • 18
    • 0001134191 scopus 로고
    • A Framework for Information Systems Architecture
    • Zachman J.A. A Framework for Information Systems Architecture. IBM Systems Journal 26 (1987) 276-292
    • (1987) IBM Systems Journal , vol.26 , pp. 276-292
    • Zachman, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.