메뉴 건너뛰기




Volumn 33, Issue 1, 2010, Pages 3-13

Safe utilization controls for more transparency in financial markets;Sichere nutzungskontrolle für mehr transparenz in finanzmärkten

Author keywords

[No Author keywords available]

Indexed keywords

DECENTRALIZED DECISION MAKING; EARLY WARNING SYSTEMS; FINANCIAL MARKET; INFORMATION FLOW CONTROL; IT INFRASTRUCTURES; MACHINE-TO-MACHINE COMMUNICATIONS; SECURITY PROPERTIES; USAGE CONTROL;

EID: 77951442815     PISSN: 01706012     EISSN: 1432122X     Source Type: Journal    
DOI: 10.1007/s00287-009-0405-y     Document Type: Article
Times cited : (22)

References (47)
  • 2
    • 13544276885 scopus 로고    scopus 로고
    • Process mining and security: Detecting anomalous process executions and checking process conformance
    • DOI 10.1016/j.entcs.2004.10.013, PII S1571066105000228
    • W Van Der Aalst A De Medeiros 2005 Process mining and security: Detecting anomalous process executions and checking process conformance Electron Notes Theor Comput Sci 121 3 21 10.1016/j.entcs.2004.10.013 (Pubitemid 40219700)
    • (2005) Electronic Notes in Theoretical Computer Science , vol.121 , Issue.SPEC. ISS. , pp. 3-21
    • Van Der Aalst, W.M.P.1    De Medeiros, A.K.A.2
  • 3
    • 44649131263 scopus 로고    scopus 로고
    • Automated privacy audits to complement the notion of control for identity management
    • Springer-Verlag, Boston In: Proceedings of the IFIP Conference on Policies and Research in Identity Management, vol 261, Springer-Verlag, Boston
    • Accorsi R. Automated Privacy Audits to Complement the Notion of Control for Identity Management. Proceedings of the IFIP Conference on Policies and Research in Identity Management, vol 261, Springer-Verlag, Boston In: Proceedings of the IFIP Conference on Policies and Research in Identity Management, vol 261, Springer-Verlag, Boston 39-48.
    • (2008) Proceedings of the IFIP Conference on Policies and Research in Identity Management , vol.261 , pp. 39-48
    • Accorsi, R.1
  • 5
    • 71249116454 scopus 로고    scopus 로고
    • Safekeeping digital evidence with secure logging protocols
    • Proceedings of the 5th Conference on IT Security Incident Management & IT Forensics, IEEE, IEEE Computer Press
    • Accorsi R (2009) Safekeeping Digital Evidence with Secure Logging Protocols. Proceedings of the 5th Conference on IT Security Incident Management & IT Forensics, IEEE, IEEE Computer Press, Los Alamitos, pp 94-110
    • (2009) Los Alamitos , pp. 94-110
    • Accorsi, R.1
  • 6
    • 57849117582 scopus 로고    scopus 로고
    • Compliance-monitor zur Frühwarnung vor risiken
    • 10.1007/s11576-008-0079-0
    • R Accorsi Y Sato S Kai 2008 Compliance-Monitor zur Frühwarnung vor Risiken Wirtschaftsinformatik 50 5 375 382 10.1007/s11576-008-0079-0
    • (2008) Wirtschaftsinformatik , vol.50 , Issue.5 , pp. 375-382
    • Accorsi, R.1    Sato, Y.2    Kai, S.3
  • 9
    • 63849243154 scopus 로고    scopus 로고
    • Ursachen und auswirkungen der subprime-Krise
    • 10.1007/s00287-009-0328-7
    • P Bartmann HU Buhl M Hertel 2009 Ursachen und Auswirkungen der Subprime-Krise Informatik-Spektrum 32 2 127 145 10.1007/s00287-009-0328-7
    • (2009) Informatik-Spektrum , vol.32 , Issue.2 , pp. 127-145
    • Bartmann, P.1    Buhl, H.U.2    Hertel, M.3
  • 10
    • 0032131165 scopus 로고    scopus 로고
    • Beyond the productivity paradox
    • E Brynjolfsson L Hitt 1998 Beyond the productivity paradox CACM 41 8 49 55
    • (1998) CACM , vol.41 , Issue.8 , pp. 49-55
    • Brynjolfsson, E.1    Hitt, L.2
  • 12
    • 37549050207 scopus 로고    scopus 로고
    • Information security: 50 years behind, 50 years ahead
    • W Diffie 2008 Information security: 50 years behind, 50 years ahead CACM 51 1 55 57
    • (2008) CACM , vol.51 , Issue.1 , pp. 55-57
    • Diffie, W.1
  • 15
    • 33646071594 scopus 로고    scopus 로고
    • On obligations
    • In: Vimercati S, Syverson P, Gollmann D (eds)
    • Hilty M, Basin D, Pretschner A (2005) On Obligations. In: Vimercati S, Syverson P, Gollmann D (eds) Lect Notes Comput Sci 3679:98-117
    • (2005) Lect Notes Comput Sci , vol.3679 , pp. 98-117
    • Hilty, M.1    Basin, D.2    Pretschner, A.3
  • 17
    • 72949119514 scopus 로고    scopus 로고
    • Model-based reasoning on the achievement of business goals
    • Shin S, Ossowski S (eds)
    • Höhn S (2009) Model-based reasoning on the achievement of business goals. In: Shin S, Ossowski S (eds) Proceedings of ACM SAC, pp 1589-1593
    • (2009) Proceedings of ACM SAC , pp. 1589-1593
    • Höhn, S.1
  • 21
    • 77951449149 scopus 로고    scopus 로고
    • Institut für Informatik und Gesellschaft, Telematik, Technischer Bericht, Universität Freiburg
    • Kittel K, Höhn S, Sackmann S (2009) Geschäftsprozess-Werkstatt. Institut für Informatik und Gesellschaft, Telematik, Technischer Bericht, Universität Freiburg
    • (2009) Geschäftsprozess-Werkstatt
    • Kittel, K.1    Höhn, S.2    Sackmann, S.3
  • 22
    • 67349182373 scopus 로고    scopus 로고
    • A brief account of runtime verification
    • 10.1016/j.jlap.2008.08.004
    • M Leucker C Schallhart 2008 A brief account of runtime verification J Log Algebraic Program 78 5 293 303 10.1016/j.jlap.2008.08.004
    • (2008) J Log Algebraic Program , vol.78 , Issue.5 , pp. 293-303
    • Leucker, M.1    Schallhart, C.2
  • 23
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • DOI 10.1007/s10207-004-0046-8
    • J Ligatti L Bauer D Walker 2005 Edit automata: Enforcement mechanisms for run-time security policies Int J Inf Secur 4 1-2 2 16 10.1007/s10207-004-0046-8 (Pubitemid 40347198)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 24
    • 57849097281 scopus 로고    scopus 로고
    • Towards systematic achievement of compliance in service-oriented architectures: The MASTER approach
    • 10.1007/s11576-008-0086-1
    • V Lotz E Pigout P Fischer F Massacci A Pretschner 2008 Towards systematic achievement of compliance in service-oriented architectures: The MASTER approach Wirtschaftsinformatik 50 5 383 391 10.1007/s11576-008-0086-1
    • (2008) Wirtschaftsinformatik , vol.50 , Issue.5 , pp. 383-391
    • Lotz, V.1    Pigout, E.2    Fischer, P.3    Massacci, F.4    Pretschner, A.5
  • 28
    • 57049144852 scopus 로고    scopus 로고
    • Information Security: 50 years behind, 50 years beyond
    • 10.1365/s11576-008-0066-5
    • G Müller 2008 Information Security: 50 years behind, 50 years beyond Wirtschaftsinformatik 50 4 322 323 10.1365/s11576-008-0066-5
    • (2008) Wirtschaftsinformatik , vol.50 , Issue.4 , pp. 322-323
    • Müller, G.1
  • 31
    • 84876600546 scopus 로고    scopus 로고
    • Multilateral security. empowering users, enabling applications. the ladenburger kolleg "security in communication technology"
    • G. Müller K. Rannenberg (eds). Technology, Infrastructure, Economy Bonn
    • Müller G, Rannenberg K (1999) Multilateral Security. Empowering Users, Enabling Applications. The Ladenburger Kolleg "Security in Communication Technology". In: Müller G, Rannenberg K (eds) Multilateral Security in Communications. Technology, Infrastructure, Economy, Bonn, pp 563-570
    • (1999) Multilateral Security in Communications , pp. 563-570
    • Müller, G.1    Rannenberg, K.2
  • 32
    • 38149023379 scopus 로고    scopus 로고
    • Using control patterns in business processes compliance
    • Weske M, Hacid M, Godart C (eds)
    • Namiri K, Stojanovic N (2007) Using Control Patterns in Business Processes Compliance. In: Weske M, Hacid M, Godart C (eds) Lect Notes Comput Sci 4832:178-190
    • (2007) Lect Notes Comput Sci , vol.4832 , pp. 178-190
    • Namiri, K.1    Stojanovic, N.2
  • 33
    • 1842848013 scopus 로고    scopus 로고
    • EXtensible business reporting language (XBRL) - Konzept und praktischer einsatz
    • A Nutz M Strau 2002 eXtensible Business Reporting Language (XBRL) - Konzept und praktischer Einsatz Wirtschaftsinformatik 44 5 447 457
    • (2002) Wirtschaftsinformatik , vol.44 , Issue.5 , pp. 447-457
    • Nutz, A.1    Strau, M.2
  • 34
    • 40549098059 scopus 로고    scopus 로고
    • Costs and benefits of XBRL adoption: Early evidence
    • R Pinsker L Shaomin 2008 Costs and benefits of XBRL adoption: early evidence CACM 51 3 47 50
    • (2008) CACM , vol.51 , Issue.3 , pp. 47-50
    • Pinsker, R.1    Shaomin, L.2
  • 35
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • A Pretschner M Hilty D Basin 2006 Distributed usage control CACM 49 9 39 44
    • (2006) CACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 37
    • 84956971202 scopus 로고    scopus 로고
    • Enforcing obligation with security monitors
    • Qing S, Okamoto T, Zhou J (eds)
    • Ribeiro C, Zúquete A, Ferreira P (2001) Enforcing Obligation with Security Monitors. In: Qing S, Okamoto T, Zhou J (eds) Lect Notes Comput Sci 2229:172-176
    • (2001) Lect Notes Comput Sci , vol.2229 , pp. 172-176
    • Ribeiro, C.1    Zúquete, A.2    Ferreira, P.3
  • 39
    • 70349363570 scopus 로고    scopus 로고
    • Assessing the effects of IT changes on IT risk - A business process-oriented view
    • Bichler M, Hess T, Krcmar H, Lecher U, Matthes F, Picot A, Speitkamp B, Wolf P (eds) Berlin
    • Sackmann S (2008) Assessing the effects of IT changes on IT risk - A business process-oriented view. In: Bichler M, Hess T, Krcmar H, Lecher U, Matthes F, Picot A, Speitkamp B, Wolf P (eds) Multikonferenz Wirtschaftsinformatik 2008, Berlin, pp 1137-1148
    • (2008) Multikonferenz Wirtschaftsinformatik 2008 , pp. 1137-1148
    • Sackmann, S.1
  • 40
    • 57849129576 scopus 로고    scopus 로고
    • ExPDT: Ein policy-basierter ansatz zur automatisierung von compliance
    • 10.1007/s11576-008-0078-1
    • S Sackmann M Kähmer 2008 ExPDT: Ein Policy-basierter Ansatz zur Automatisierung von Compliance Wirtschaftsinformatik 50 5 366 374 10.1007/s11576-008-0078-1
    • (2008) Wirtschaftsinformatik , vol.50 , Issue.5 , pp. 366-374
    • Sackmann, S.1    Kähmer, M.2
  • 42
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • 10.1109/35.312842
    • R Sandhu P Samarati 1994 Access Control: Principles and Practice IEEE Commun Mag 32 9 40 48 10.1109/35.312842
    • (1994) IEEE Commun Mag , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 43
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • 10.1145/353323.353382
    • F Schneider 2000 Enforceable Security Policies ACM Transact Inform Syst Secur 3 1 30 50 10.1145/353323.353382
    • (2000) ACM Transact Inform Syst Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.