-
1
-
-
33846674492
-
-
Technical report, Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA August
-
C. Alberts, A. Dorofee, J. Stevens, and C. Woody. Introduction to the OCTAVE approach. Technical report, Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA 15213-23890, August 2003.
-
(2003)
Introduction to the OCTAVE Approach
, pp. 15213-23890
-
-
Alberts, C.1
Dorofee, A.2
Stevens, J.3
Woody, C.4
-
3
-
-
77951184002
-
-
DCSSI General Secretariat of National Defence Central Information Systems Security Division (DCSSI), February
-
DCSSI. EBIOS - Section 2 - Approach. General Secretariat of National Defence Central Information Systems Security Division (DCSSI), February 2004.
-
(2004)
EBIOS - Section 2 - Approach
-
-
-
5
-
-
39749101462
-
Security ontologies: Improving quantitative risk analysis
-
Los Alamitos, CA, USA, January IEEE Computer Society. 0-7695-2755-8
-
A. Ekelhart, S. Fenz, M. Klemen, and E. Weippl. Security ontologies: Improving quantitative risk analysis. In Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007, pages 156-162, Los Alamitos, CA, USA, January 2007. IEEE Computer Society. 0-7695-2755-8.
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007
, pp. 156-162
-
-
Ekelhart, A.1
Fenz, S.2
Klemen, M.3
Weippl, E.4
-
6
-
-
77953791271
-
Formal threat descriptions for enhancing governmental risk assessment
-
New York, NY, USA, January ACM. 978-1-59593-822-0
-
A. Ekelhart, S. Fenz, T. Neubauer, and E. Weippl. Formal threat descriptions for enhancing governmental risk assessment. In Proceedings of the First ICEGOV, volume 232 of ACM International Conference Proceeding Series, pages 40-43, New York, NY, USA, January 2007. ACM. 978-1-59593-822-0.
-
(2007)
Proceedings of the First ICEGOV, volume 232 of ACM International Conference Proceeding Series
, pp. 40-43
-
-
Ekelhart, A.1
Fenz, S.2
Neubauer, T.3
Weippl, E.4
-
7
-
-
9744234714
-
One approach to risk assessment
-
February
-
B. Farquhar. One approach to risk assessment. Computers and Security, 10(10):21-23, February 1991.
-
(1991)
Computers and Security
, vol.10
, Issue.10
, pp. 21-23
-
-
Farquhar, B.1
-
8
-
-
84949226562
-
The coras framework for a model-based risk management process
-
London, UK, Springer-Verlag
-
R. Fredriksen, M. Kristiansen, B. A. Gran, K. Stolen, T. A. Opperud, and T. Dimitrakos. The coras framework for a model-based risk management process. In SAFECOMP '02: Proceedings of the 21st International Conference on Computer Safety, Reliability and Security, pages 94-105, London, UK, 2002. Springer-Verlag.
-
(2002)
SAFECOMP '02: Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
, pp. 94-105
-
-
Fredriksen, R.1
Kristiansen, M.2
Gran, B.A.3
Stolen, K.4
Opperud, T.A.5
Dimitrakos, T.6
-
10
-
-
0033366543
-
Software selection: A case study of the application of the analytical hierarchical process to the selection of a multimedia authoring system
-
V. S. Lai, R. P. Trueblood, and B. K. Wong. Software selection: A case study of the application of the analytical hierarchical process to the selection of a multimedia authoring system. Information & Management, 36, 1999.
-
(1999)
Information & Management
, vol.36
-
-
Lai, V.S.1
Trueblood, R.P.2
Wong, B.K.3
-
11
-
-
48249084117
-
Interactive selection of iso 27001 controls under multiple objectives
-
Boston, July Springer
-
T. Neubauer, A. Ekelhart, and S. Fenz. Interactive selection of iso 27001 controls under multiple objectives. In Proceedings of the IFIPSec2008, volume 278/2008, pages 477-492, Boston, July 2008. Springer.
-
(2008)
Proceedings of the IFIPSec2008
, vol.278-2008
, pp. 477-492
-
-
Neubauer, T.1
Ekelhart, A.2
Fenz, S.3
-
12
-
-
35248819578
-
Extending business process management to determine efficient it investments
-
T. Neubauer and C. Stummer. Extending business process management to determine efficient it investments. In Proceedings of the SAC2007, pages 1250-1256, 2007.
-
(2007)
Proceedings of the SAC2007
, pp. 1250-1256
-
-
Neubauer, T.1
Stummer, C.2
-
14
-
-
17644399080
-
Risk management guide for information technology systems
-
National Institute of Standards and Technology (NIST), Gaithersburg, MD July
-
G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. NIST Special Publication 800-30, National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-28930, July 2002.
-
(2002)
NIST Special Publication 800-30
, pp. 20899-28930
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
|