메뉴 건너뛰기




Volumn 2453, Issue , 2002, Pages 557-566

CoSMo: An approach towards Conceptual Security Modeling

Author keywords

Conceptual modeling; Security; Security modeling

Indexed keywords

CRYPTOGRAPHY; EXPERT SYSTEMS;

EID: 84863584576     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46146-9_55     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 1
    • 0025693876 scopus 로고    scopus 로고
    • The Sematic Data Model for Security: Representing the Security Semantics of an Application
    • IEEE, Computer Society Press
    • Smith, G. W., The Sematic Data Model for Security: Representing the Security Semantics of an Application, Proc. 6th Int’l Conf on Data Engineering (ICDE’90), IEEE, Computer Society Press
    • Proc. 6Th Int’l Conf on Data Engineering (ICDE’90)
    • Smith, G.W.1
  • 4
    • 84976766949 scopus 로고    scopus 로고
    • The Entity Relationship Model: Towards a Unified View of Data
    • Chen, P. P., The Entity Relationship Model: Towards a Unified View of Data, ACM Trans on Database Systems (TODS), Vol. 1(1)
    • ACM Trans on Database Systems (TODS) , vol.1 , Issue.1
    • Chen, P.P.1
  • 8
    • 33750937974 scopus 로고    scopus 로고
    • Security and Integrity Requirements of Business Processes - Analysis and Approach to Support their Realization
    • Heidelberg, 14-15. June
    • Herrmann G., Security and Integrity Requirements of Business Processes - Analysis and Approach to Support their Realization, Proc. CAiSE*99 6th Doctoral Consortium on Advanced Information Systems Engineering, Heidelberg, 14-15. June, 1999, pp.36-47
    • (1999) Proc. Caise*99 6Th Doctoral Consortium on Advanced Information Systems Engineering , pp. 36-47
    • Herrmann, G.1
  • 10
    • 84949821146 scopus 로고    scopus 로고
    • Sicherheitsanforderungen im Rahmen der Bedrohungs- und Risikoanalyse von IT-Systemen
    • Springer-Verlag
    • Thoben W., Sicherheitsanforderungen im Rahmen der Bedrohungs- und Risikoanalyse von IT-Systemen, Datenbanksysteme in Büro, Technik und Wissenschaft (BTW’97), Springer-Verlag, S. 279-298, 1997
    • (1997) Datenbanksysteme in Büro, Technik Und Wissenschaft (BTW’97) , pp. 279-298
    • Thoben, W.1
  • 11
    • 25944479730 scopus 로고    scopus 로고
    • Ein unscharfes Bewertungskonzept für die Bedrohungs- und Risikoanalyse Workflow-basierter Anwendungen
    • A. Röhm, D. Fox, R. Grimm und D. Schoder (Hrsg), Vieweg-Verlag, Essen, October 98
    • Schönberg A., Thoben W., Ein unscharfes Bewertungskonzept für die Bedrohungs- und Risikoanalyse Workflow-basierter Anwendungen, Sicherheit und Electronic Commerce -Konzepte, Modelle und technische Möglichkeiten (WS SEC'98), A. Röhm, D. Fox, R. Grimm und D. Schoder (Hrsg), S. 47-62, Vieweg-Verlag, Essen, October 98
    • Sicherheit Und Electronic Commerce -Konzepte, Modelle Und Technische Möglichkeiten (WS SEC'98) , pp. 47-62
    • Schönberg, A.1    Thoben, W.2
  • 12
  • 14
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, Access Control and Audit
    • March
    • Sandhu R., Samarati P., Authentication, Access Control and Audit, ACM Computing Surveys, Vol. 28, No.1, March 1996
    • (1996) ACM Computing Surveys , vol.28 , Issue.1
    • Sandhu, R.1    Samarati, P.2
  • 16
    • 84949743170 scopus 로고    scopus 로고
    • Faculty of Natural Sciences and Engineering Johannes Kepler University Linz, PhD Thesis, January
    • Eßmayr W., Role-Based Access Controls in Interoperable Environments, Faculty of Natural Sciences and Engineering Johannes Kepler University Linz, PhD Thesis, January 1999
    • (1999) Role-Based Access Controls in Interoperable Environments
    • Eßmayr, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.