메뉴 건너뛰기




Volumn 30, Issue 6-7, 2011, Pages 410-426

Compliance by design - Bridging the chasm between auditors and IT architects

Author keywords

Business processes; CAVR; Compliance; Enterprise applications; Information systems audit; Patterns; Security architecture; Service oriented architecture

Indexed keywords

BUSINESS PROCESS; CAVR; COMPLIANCE; ENTERPRISE APPLICATIONS; PATTERNS; SECURITY ARCHITECTURE; SERVICE ORIENTED;

EID: 80051786633     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.03.005     Document Type: Article
Times cited : (30)

References (56)
  • 1
    • 80051798975 scopus 로고    scopus 로고
    • AICPA URL: American Institute of Certified Public Accountants
    • AICPA Generally accepted Auditing Standards. SAS 95 URL: 2001 American Institute of Certified Public Accountants http://www.aicpa.org/download/members/ div/auditstd/AU-00150.PDF
    • (2001) Generally Accepted Auditing Standards. SAS 95
  • 16
    • 80051792144 scopus 로고    scopus 로고
    • Congress of the United States of America. Sarbanes-Oxley Act of 2002, H.R. 3763
    • Congress of the United States of America. Sarbanes-Oxley Act of 2002, H.R. 3763.
  • 21
    • 44649173066 scopus 로고    scopus 로고
    • Security Lessons Learned from Société Géné rale
    • J. Epstein Security Lessons Learned from Société Générale IEEE Security & Privacy 6 3 2008
    • (2008) IEEE Security & Privacy , vol.6 , Issue.3
    • Epstein, J.1
  • 39
    • 80051795014 scopus 로고    scopus 로고
    • Principles and applications of cryptographic key management
    • H.F. Tipton, M. Krause, 6th ed. Auerbach
    • W.H. Murray Principles and applications of cryptographic key management H.F. Tipton, M. Krause, Information security management handbook 6th ed. 2007 Auerbach
    • (2007) Information Security Management Handbook
    • Murray, W.H.1
  • 40
    • 0003969633 scopus 로고
    • NIST Department of Defense, National Security Institute
    • NIST Trusted computer system evaluation criteria 1983 Department of Defense, National Security Institute
    • (1983) Trusted Computer System Evaluation Criteria
  • 42
    • 79952035383 scopus 로고    scopus 로고
    • OAuth Core Workgoup URL
    • OAuth Core Workgoup OAuth core 1.0 Revision A URL: http://oauth.net/core/ 1.0a June 2009
    • (2009) OAuth Core 1.0 Revision A
  • 47
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J.H. Saltzer, and M.D. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 1975 1278 1308
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.