메뉴 건너뛰기




Volumn , Issue , 2009, Pages 393-398

Automated risk and utility management

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS VALUE; CORPORATE STRATEGIES; DECISION MAKERS; INFORMATION SECURITY; IT SECURITY; RELIABLE EXECUTION; SECURITY MEASURE; UTILITY MANAGEMENT;

EID: 77951146012     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2009.23     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 1
    • 33846674492 scopus 로고    scopus 로고
    • Technical report, Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA August
    • C. Alberts, A. Dorofee, J. Stevens, and C. Woody. Introduction to the OCTAVE approach. Technical report, Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA 15213-23890, August 2003.
    • (2003) Introduction to the OCTAVE Approach , pp. 15213-23890
    • Alberts, C.1    Dorofee, A.2    Stevens, J.3    Woody, C.4
  • 3
    • 77951184002 scopus 로고    scopus 로고
    • DCSSI General Secretariat of National Defence Central Information Systems Security Division (DCSSI), February
    • DCSSI. EBIOS - Section 2 - Approach. General Secretariat of National Defence Central Information Systems Security Division (DCSSI), February 2004.
    • (2004) EBIOS - Section 2 - Approach
  • 7
    • 9744234714 scopus 로고
    • One approach to risk assessment
    • February
    • B. Farquhar. One approach to risk assessment. Computers and Security, 10(10):21-23, February 1991.
    • (1991) Computers and Security , vol.10 , Issue.10 , pp. 21-23
    • Farquhar, B.1
  • 10
    • 0033366543 scopus 로고    scopus 로고
    • Software selection: A case study of the application of the analytical hierarchical process to the selection of a multimedia authoring system
    • V. S. Lai, R. P. Trueblood, and B. K. Wong. Software selection: A case study of the application of the analytical hierarchical process to the selection of a multimedia authoring system. Information & Management, 36, 1999.
    • (1999) Information & Management , vol.36
    • Lai, V.S.1    Trueblood, R.P.2    Wong, B.K.3
  • 11
    • 48249084117 scopus 로고    scopus 로고
    • Interactive selection of iso 27001 controls under multiple objectives
    • Boston, July Springer
    • T. Neubauer, A. Ekelhart, and S. Fenz. Interactive selection of iso 27001 controls under multiple objectives. In Proceedings of the IFIPSec2008, volume 278/2008, pages 477-492, Boston, July 2008. Springer.
    • (2008) Proceedings of the IFIPSec2008 , vol.278-2008 , pp. 477-492
    • Neubauer, T.1    Ekelhart, A.2    Fenz, S.3
  • 12
    • 35248819578 scopus 로고    scopus 로고
    • Extending business process management to determine efficient it investments
    • T. Neubauer and C. Stummer. Extending business process management to determine efficient it investments. In Proceedings of the SAC2007, pages 1250-1256, 2007.
    • (2007) Proceedings of the SAC2007 , pp. 1250-1256
    • Neubauer, T.1    Stummer, C.2
  • 14
    • 17644399080 scopus 로고    scopus 로고
    • Risk management guide for information technology systems
    • National Institute of Standards and Technology (NIST), Gaithersburg, MD July
    • G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. NIST Special Publication 800-30, National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-28930, July 2002.
    • (2002) NIST Special Publication 800-30 , pp. 20899-28930
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.