-
3
-
-
84870976495
-
-
BITKOM, last accessed on 15.07.2005
-
BITKOM (2005). Kompass der IT-Sicherheitsstandards, http://www.bitkom.org/files/documents/BITKOM_Broschuere_Sicherheitsstandard_V1.01f.pdf, last accessed on 15.07.2005
-
(2005)
Kompass Der IT-Sicherheitsstandards
-
-
-
4
-
-
33644518673
-
-
Santa Fe
-
Braun, C. and Wortmann, F. and Hafner, M., Winter, R. (2005). Method Construction - A Core Approach to Organizational Engineering, Santa Fe, 1295-1299.
-
(2005)
Method Construction - a Core Approach to Organizational Engineering
, pp. 1295-1299
-
-
Braun, C.1
Wortmann, F.2
Hafner, M.3
Winter, R.4
-
6
-
-
84871001166
-
-
BSI, last accessed on 17.02.2005
-
BSI (2004). IT-Grundschutzhandbuch, http://www.bsi.de/gshb/deutsch/menue.htm, last accessed on 17.02.2005
-
(2004)
IT-Grundschutzhandbuch
-
-
-
7
-
-
84870987982
-
-
Congress of the United States of America, last accessed on 2005-12-06
-
Congress of the United States of America (2002). The Sarbanes-Oxley Act of 2002, http://news.findlaw.com/hdocs/docs/gwbush/sarbanesoxley072302.pdf, last accessed on 2005-12-06
-
(2002)
The Sarbanes-Oxley Act of 2002
-
-
-
11
-
-
0012213034
-
-
ISO, last accessed on 2004-03-01
-
ISO (2000). ISO/IEC 17799 - Code of Practice for Information Security Management, http://www.iso.ch/iso/en/prodsservices/popstds/.../fr/CatalogueDetailPage.CatalogueDetail?CSNUMBER=33441&ICS1=35, last accessed on 2004-03-01
-
(2000)
ISO/IEC 17799 - Code of Practice For Information Security Management
-
-
-
12
-
-
84870976251
-
Realisierung von Sicherheitsstrategien mit Hilfe flexibler Zugriffskontrollmechanismen
-
In: Bauknecht, K.Dittrich, K. (eds.), Zürich: vdf
-
Jonscher, D., Dittrich, K. (1994). Realisierung von Sicherheitsstrategien mit Hilfe flexibler Zugriffskontrollmechanismen. In: Bauknecht, K.Dittrich, K. (eds.). Sicherheit in Informationssystemen. Zürich: vdf, 23-52.
-
(1994)
Sicherheit In Informationssystemen
, pp. 23-52
-
-
Jonscher, D.1
Dittrich, K.2
-
13
-
-
4143123270
-
-
Yorktown Heights
-
Kern, A., Kuhlmann, M., Kuropka, R., Ruthert, A. (2004). A Meta Model for Authorisations in Application Security Systems and Their Integration into RBAC Administration, Yorktown Heights, 87-96.
-
(2004)
A Meta Model For Authorisations In Application Security Systems and Their Integration Into RBAC Administration
, pp. 87-96
-
-
Kern, A.1
Kuhlmann, M.2
Kuropka, R.3
Ruthert, A.4
-
14
-
-
0242709337
-
Observations on the Role Life-Cycle in the Context of Enterprise Security Management
-
Monterey
-
Kern, A., Kuhlmann, M., Schaad, A., Moffett, J.D. (2002). Observations on the Role Life-Cycle in the Context of Enterprise Security Management, Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Monterey, 43-51.
-
(2002)
Proceedings of the 7th ACM Symposium On Access Control Models and Technologies
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.D.4
-
15
-
-
0242625194
-
Role Mining - Revealing Business Roles for Security Administration Using Data Mining Technology
-
Como
-
Kuhlmann, M. and Shohat, D., Schimpf, G. (2003). Role Mining - Revealing Business Roles for Security Administration Using Data Mining Technology, Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, Como, 179-186.
-
(2003)
Proceedings of the 8th ACM Symposium On Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
16
-
-
27744437840
-
-
Stuttgart: Schäffer-Poeschel
-
Menzies, C. and Martin, A. and Jourdan, C., Koch, M., Strohm, A., Heinze, T. (2004). Sarbanes-Oxley Act. Stuttgart: Schäffer-Poeschel.
-
(2004)
Sarbanes-Oxley Act
-
-
Menzies, C.1
Martin, A.2
Jourdan, C.3
Koch, M.4
Strohm, A.5
Heinze, T.6
-
17
-
-
0003724905
-
Information Systems Security - Scope, State-of-the-art and Evaluation of Techniques
-
Pernul, G. (1995). Information Systems Security - Scope, State-of-the-art and Evaluation of Techniques. International Journal of Information Management, 15 (3), 165-180.
-
(1995)
International Journal of Information Management
, vol.15
, Issue.3
, pp. 165-180
-
-
Pernul, G.1
-
18
-
-
37749043462
-
Data Security in the Age of Compliance
-
Robinson, T. (2005). Data Security in the Age of Compliance. netWorker, 9 (3), 24-30.
-
(2005)
NetWorker
, vol.9
, Issue.3
, pp. 24-30
-
-
Robinson, T.1
-
19
-
-
0033646113
-
Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization
-
Berlin
-
Roeckle, H. and Schimpf, G., Weidinger, R. (2000). Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization, Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin, 103-110.
-
(2000)
Proceedings of the 5th ACM Workshop On Role-Based Access Control
, pp. 103-110
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
-
20
-
-
84870153874
-
Zugriffskontrolle in heterogenen Applikationslandschaften
-
In: Schelp, J.Winter, R. (eds.), Berlin: Springer
-
Rupprecht, J., Wortmann, F. (2006). Zugriffskontrolle in heterogenen Applikationslandschaften. In: Schelp, J.Winter, R. (eds.). Integrations management. Berlin: Springer, 123-168.
-
(2006)
Integrations Management
, pp. 123-168
-
-
Rupprecht, J.1
Wortmann, F.2
-
21
-
-
84964853055
-
Access Control - Policies, Models and Mechanisms
-
In: Focardi, R.Gorrieri, R. (eds.), Berlin: Springer
-
Samarati, P., de Capitani di Vimercati, S. (2002). Access Control - Policies, Models and Mechanisms. In: Focardi, R.Gorrieri, R. (eds.). Foundations of Security Analysis and Design - Tutorial Lectures. Berlin: Springer, 137-196.
-
(2002)
Foundations of Security Analysis and Design - Tutorial Lectures
, pp. 137-196
-
-
Samarati, P.1
De Capitani2
Di Vimercati, S.3
|