-
2
-
-
13544276885
-
Process mining and security: Detecting anomalous process executions and checking process conformance
-
DOI 10.1016/j.entcs.2004.10.013, PII S1571066105000228
-
W Van Der Aalst A De Medeiros 2005 Process mining and security: Detecting anomalous process executions and checking process conformance Electron Notes Theor Comput Sci 121 3 21 10.1016/j.entcs.2004.10.013 (Pubitemid 40219700)
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.121
, Issue.SPEC. ISS.
, pp. 3-21
-
-
Van Der Aalst, W.M.P.1
De Medeiros, A.K.A.2
-
3
-
-
44649131263
-
Automated privacy audits to complement the notion of control for identity management
-
Springer-Verlag, Boston In: Proceedings of the IFIP Conference on Policies and Research in Identity Management, vol 261, Springer-Verlag, Boston
-
Accorsi R. Automated Privacy Audits to Complement the Notion of Control for Identity Management. Proceedings of the IFIP Conference on Policies and Research in Identity Management, vol 261, Springer-Verlag, Boston In: Proceedings of the IFIP Conference on Policies and Research in Identity Management, vol 261, Springer-Verlag, Boston 39-48.
-
(2008)
Proceedings of the IFIP Conference on Policies and Research in Identity Management
, vol.261
, pp. 39-48
-
-
Accorsi, R.1
-
5
-
-
71249116454
-
Safekeeping digital evidence with secure logging protocols
-
Proceedings of the 5th Conference on IT Security Incident Management & IT Forensics, IEEE, IEEE Computer Press
-
Accorsi R (2009) Safekeeping Digital Evidence with Secure Logging Protocols. Proceedings of the 5th Conference on IT Security Incident Management & IT Forensics, IEEE, IEEE Computer Press, Los Alamitos, pp 94-110
-
(2009)
Los Alamitos
, pp. 94-110
-
-
Accorsi, R.1
-
6
-
-
57849117582
-
Compliance-monitor zur Frühwarnung vor risiken
-
10.1007/s11576-008-0079-0
-
R Accorsi Y Sato S Kai 2008 Compliance-Monitor zur Frühwarnung vor Risiken Wirtschaftsinformatik 50 5 375 382 10.1007/s11576-008-0079-0
-
(2008)
Wirtschaftsinformatik
, vol.50
, Issue.5
, pp. 375-382
-
-
Accorsi, R.1
Sato, Y.2
Kai, S.3
-
9
-
-
63849243154
-
Ursachen und auswirkungen der subprime-Krise
-
10.1007/s00287-009-0328-7
-
P Bartmann HU Buhl M Hertel 2009 Ursachen und Auswirkungen der Subprime-Krise Informatik-Spektrum 32 2 127 145 10.1007/s00287-009-0328-7
-
(2009)
Informatik-Spektrum
, vol.32
, Issue.2
, pp. 127-145
-
-
Bartmann, P.1
Buhl, H.U.2
Hertel, M.3
-
10
-
-
0032131165
-
Beyond the productivity paradox
-
E Brynjolfsson L Hitt 1998 Beyond the productivity paradox CACM 41 8 49 55
-
(1998)
CACM
, vol.41
, Issue.8
, pp. 49-55
-
-
Brynjolfsson, E.1
Hitt, L.2
-
11
-
-
77955338722
-
The platform for privacy preferences 1.1 (P3P1.1)
-
Abruf am 27. August 2009
-
Cranor LF, Dobbs B, Egelman S, Hogben G, Hunphrey J, Langheinrich M, Marchiori M, Presler-Marschal M, Reagle J, Schunter M, Stampley D, Wenning R (2006) The Platform for Privacy Preferences 1.1 (P3P1.1). W3C specification. http://www.w3.org/TR/P3P11/ (Abruf am 27. August 2009)
-
(2006)
W3C Specification
-
-
Cranor, L.F.1
Dobbs, B.2
Egelman, S.3
Hogben, G.4
Hunphrey, J.5
Langheinrich, M.6
Marchiori, M.7
Presler-Marschal, M.8
Reagle, J.9
Schunter, M.10
Stampley, D.11
Wenning, R.12
-
12
-
-
37549050207
-
Information security: 50 years behind, 50 years ahead
-
W Diffie 2008 Information security: 50 years behind, 50 years ahead CACM 51 1 55 57
-
(2008)
CACM
, vol.51
, Issue.1
, pp. 55-57
-
-
Diffie, W.1
-
15
-
-
33646071594
-
On obligations
-
In: Vimercati S, Syverson P, Gollmann D (eds)
-
Hilty M, Basin D, Pretschner A (2005) On Obligations. In: Vimercati S, Syverson P, Gollmann D (eds) Lect Notes Comput Sci 3679:98-117
-
(2005)
Lect Notes Comput Sci
, vol.3679
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
Pretschner, A.3
-
17
-
-
72949119514
-
Model-based reasoning on the achievement of business goals
-
Shin S, Ossowski S (eds)
-
Höhn S (2009) Model-based reasoning on the achievement of business goals. In: Shin S, Ossowski S (eds) Proceedings of ACM SAC, pp 1589-1593
-
(2009)
Proceedings of ACM SAC
, pp. 1589-1593
-
-
Höhn, S.1
-
19
-
-
0011795795
-
-
Kluwer Academic Publishers Boston
-
Jajodia S, Kudo M, Subrahmanian V (2001) Provisional Authorizations, E-Commerce Security and Privacy. Kluwer Academic Publishers, Boston, pp 133-159
-
(2001)
Provisional Authorizations, E-Commerce Security and Privacy
, pp. 133-159
-
-
Jajodia, S.1
Kudo, M.2
Subrahmanian, V.3
-
21
-
-
77951449149
-
-
Institut für Informatik und Gesellschaft, Telematik, Technischer Bericht, Universität Freiburg
-
Kittel K, Höhn S, Sackmann S (2009) Geschäftsprozess-Werkstatt. Institut für Informatik und Gesellschaft, Telematik, Technischer Bericht, Universität Freiburg
-
(2009)
Geschäftsprozess-Werkstatt
-
-
Kittel, K.1
Höhn, S.2
Sackmann, S.3
-
22
-
-
67349182373
-
A brief account of runtime verification
-
10.1016/j.jlap.2008.08.004
-
M Leucker C Schallhart 2008 A brief account of runtime verification J Log Algebraic Program 78 5 293 303 10.1016/j.jlap.2008.08.004
-
(2008)
J Log Algebraic Program
, vol.78
, Issue.5
, pp. 293-303
-
-
Leucker, M.1
Schallhart, C.2
-
23
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
DOI 10.1007/s10207-004-0046-8
-
J Ligatti L Bauer D Walker 2005 Edit automata: Enforcement mechanisms for run-time security policies Int J Inf Secur 4 1-2 2 16 10.1007/s10207-004-0046-8 (Pubitemid 40347198)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
24
-
-
57849097281
-
Towards systematic achievement of compliance in service-oriented architectures: The MASTER approach
-
10.1007/s11576-008-0086-1
-
V Lotz E Pigout P Fischer F Massacci A Pretschner 2008 Towards systematic achievement of compliance in service-oriented architectures: The MASTER approach Wirtschaftsinformatik 50 5 383 391 10.1007/s11576-008-0086-1
-
(2008)
Wirtschaftsinformatik
, vol.50
, Issue.5
, pp. 383-391
-
-
Lotz, V.1
Pigout, E.2
Fischer, P.3
Massacci, F.4
Pretschner, A.5
-
28
-
-
57049144852
-
Information Security: 50 years behind, 50 years beyond
-
10.1365/s11576-008-0066-5
-
G Müller 2008 Information Security: 50 years behind, 50 years beyond Wirtschaftsinformatik 50 4 322 323 10.1365/s11576-008-0066-5
-
(2008)
Wirtschaftsinformatik
, vol.50
, Issue.4
, pp. 322-323
-
-
Müller, G.1
-
29
-
-
80455142014
-
Sicherheit im ubiquitous computing: Schutz durch gebote?
-
F. Mattern (eds). Springer Berlin
-
Müller G, Accorsi R, Höhn S, Kähmer M, Strasser M (2007) Sicherheit im Ubiquitous Computing: Schutz durch Gebote? In: Mattern F (Hrsg) Die Informatisierung des Alltags. Leben in smarten Umgebungen. Springer, Berlin
-
(2007)
Die Informatisierung des Alltags. Leben in Smarten Umgebungen
-
-
Müller, G.1
Accorsi, R.2
Höhn, S.3
Kähmer, M.4
Strasser, M.5
-
31
-
-
84876600546
-
Multilateral security. empowering users, enabling applications. the ladenburger kolleg "security in communication technology"
-
G. Müller K. Rannenberg (eds). Technology, Infrastructure, Economy Bonn
-
Müller G, Rannenberg K (1999) Multilateral Security. Empowering Users, Enabling Applications. The Ladenburger Kolleg "Security in Communication Technology". In: Müller G, Rannenberg K (eds) Multilateral Security in Communications. Technology, Infrastructure, Economy, Bonn, pp 563-570
-
(1999)
Multilateral Security in Communications
, pp. 563-570
-
-
Müller, G.1
Rannenberg, K.2
-
32
-
-
38149023379
-
Using control patterns in business processes compliance
-
Weske M, Hacid M, Godart C (eds)
-
Namiri K, Stojanovic N (2007) Using Control Patterns in Business Processes Compliance. In: Weske M, Hacid M, Godart C (eds) Lect Notes Comput Sci 4832:178-190
-
(2007)
Lect Notes Comput Sci
, vol.4832
, pp. 178-190
-
-
Namiri, K.1
Stojanovic, N.2
-
33
-
-
1842848013
-
EXtensible business reporting language (XBRL) - Konzept und praktischer einsatz
-
A Nutz M Strau 2002 eXtensible Business Reporting Language (XBRL) - Konzept und praktischer Einsatz Wirtschaftsinformatik 44 5 447 457
-
(2002)
Wirtschaftsinformatik
, vol.44
, Issue.5
, pp. 447-457
-
-
Nutz, A.1
Strau, M.2
-
34
-
-
40549098059
-
Costs and benefits of XBRL adoption: Early evidence
-
R Pinsker L Shaomin 2008 Costs and benefits of XBRL adoption: early evidence CACM 51 3 47 50
-
(2008)
CACM
, vol.51
, Issue.3
, pp. 47-50
-
-
Pinsker, R.1
Shaomin, L.2
-
37
-
-
84956971202
-
Enforcing obligation with security monitors
-
Qing S, Okamoto T, Zhou J (eds)
-
Ribeiro C, Zúquete A, Ferreira P (2001) Enforcing Obligation with Security Monitors. In: Qing S, Okamoto T, Zhou J (eds) Lect Notes Comput Sci 2229:172-176
-
(2001)
Lect Notes Comput Sci
, vol.2229
, pp. 172-176
-
-
Ribeiro, C.1
Zúquete, A.2
Ferreira, P.3
-
39
-
-
70349363570
-
Assessing the effects of IT changes on IT risk - A business process-oriented view
-
Bichler M, Hess T, Krcmar H, Lecher U, Matthes F, Picot A, Speitkamp B, Wolf P (eds) Berlin
-
Sackmann S (2008) Assessing the effects of IT changes on IT risk - A business process-oriented view. In: Bichler M, Hess T, Krcmar H, Lecher U, Matthes F, Picot A, Speitkamp B, Wolf P (eds) Multikonferenz Wirtschaftsinformatik 2008, Berlin, pp 1137-1148
-
(2008)
Multikonferenz Wirtschaftsinformatik 2008
, pp. 1137-1148
-
-
Sackmann, S.1
-
40
-
-
57849129576
-
ExPDT: Ein policy-basierter ansatz zur automatisierung von compliance
-
10.1007/s11576-008-0078-1
-
S Sackmann M Kähmer 2008 ExPDT: Ein Policy-basierter Ansatz zur Automatisierung von Compliance Wirtschaftsinformatik 50 5 366 374 10.1007/s11576-008-0078-1
-
(2008)
Wirtschaftsinformatik
, vol.50
, Issue.5
, pp. 366-374
-
-
Sackmann, S.1
Kähmer, M.2
-
42
-
-
0028513932
-
Access control: Principles and practice
-
10.1109/35.312842
-
R Sandhu P Samarati 1994 Access Control: Principles and Practice IEEE Commun Mag 32 9 40 48 10.1109/35.312842
-
(1994)
IEEE Commun Mag
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
43
-
-
84881225236
-
Enforceable security policies
-
10.1145/353323.353382
-
F Schneider 2000 Enforceable Security Policies ACM Transact Inform Syst Secur 3 1 30 50 10.1145/353323.353382
-
(2000)
ACM Transact Inform Syst Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
|