메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Supporting compliance through enhancing internal control systems by conceptual business process security modeling

Author keywords

BPM; Compliance; Conceptual modeling; Internal control; IT Security

Indexed keywords

BPM; COMPLIANCE; CONCEPTUAL MODELING; INTERNAL CONTROLS; IT SECURITY;

EID: 84870387775     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (29)
  • 7
    • 29544446298 scopus 로고    scopus 로고
    • Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799
    • December
    • Haworth, D.A., Pietron, L.R. 2006. "Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799, " Information Systems Management (23:1), December, pp 73-87.
    • (2006) Information Systems Management , vol.23 , Issue.1 , pp. 73-87
    • Haworth, D.A.1    Pietron, L.R.2
  • 8
    • 33749367621 scopus 로고    scopus 로고
    • Security Requirement Analysis of Business Processes
    • October
    • Herrmann, P., Herrmann, G. 2006. "Security Requirement Analysis of Business Processes, " Electronic Commerce Research (6:3-4), October, pp 305-335.
    • (2006) Electronic Commerce Research , vol.6 , Issue.3-4 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2
  • 9
    • 84870541991 scopus 로고    scopus 로고
    • Business Process Management: A Research Overview and Analysis
    • Paper 785
    • Ho, Danny Ting-Yi., Jin, Yulong. 2009. "Business Process Management: A Research Overview and Analysis, " Proc. of AMCIS '09, Paper 785.
    • (2009) Proc. of AMCIS '09
    • Ting-Yi, H.D.1    Yulong, J.2
  • 13
    • 79960294968 scopus 로고    scopus 로고
    • A Business Process-based Modelling Extension for Regulatory Compliance
    • Karagiannis, D. 2008. "A Business Process-based Modelling Extension for Regulatory Compliance, " Multikonferenz Wirtschaftsinformatik (MKWI '08), pp 1159-1173.
    • (2008) Multikonferenz Wirtschaftsinformatik (MKWI '08) , pp. 1159-1173
    • Karagiannis, D.1
  • 20
    • 34247151648 scopus 로고    scopus 로고
    • A BPMN Extension for the Modeling of Security Requirements in Business Processes
    • March
    • Rodríguez, A., Fernández-Medina, E., Piattini, M. 2007a. "A BPMN Extension for the Modeling of Security Requirements in Business Processes, " IEICE Transactions (90-D:4), March, pp 745-752.
    • (2007) IEICE Transactions , vol.90 , Issue.4 , pp. 745-752
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 21
    • 38949100023 scopus 로고    scopus 로고
    • An MDA Approach to Develop Secure Business Processes through a UML 2.0 Extension
    • September
    • Rodríguez, A., Fernández-Medina, E., Piattini, M. 2007b. "An MDA Approach to Develop Secure Business Processes through a UML 2.0 Extension, " Computer Systems Science & Engineering (22:5), September, pp 308-320.
    • (2007) Computer Systems Science & Engineering , vol.22 , Issue.5 , pp. 308-320
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 23
    • 64249086031 scopus 로고    scopus 로고
    • Security Analysis of Electronic Business Processes
    • January-April
    • Röhrig, S., Knorr, K. 2004. "Security Analysis of Electronic Business Processes, " Electronic Commerce Research (4:1-2), January-April, pp 59-81.
    • (2004) Electronic Commerce Research , vol.4 , Issue.1-2 , pp. 59-81
    • Röhrig, S.1    Knorr, K.2
  • 25
    • 44649172442 scopus 로고    scopus 로고
    • Do secure Information System Design Methods Provide Adequate Modeling Support?
    • August
    • Siponen, M.T., Heikkar, J. 2008. "Do secure Information System Design Methods Provide Adequate Modeling Support?, " Information & Software Technology (50:9-10), August, pp 1034-1053.
    • (2008) Information & Software Technology , vol.50 , Issue.9-10 , pp. 1034-1053
    • Siponen, M.T.1    Heikkar, J.2
  • 26
    • 0036568021 scopus 로고    scopus 로고
    • Data pricacy approaches from US and EU perspectives
    • May
    • Steinke, G. 2002. "Data pricacy approaches from US and EU perspectives, " Telematics and Informatics (19:2), May, pp 193-200.
    • (2002) Telematics and Informatics , vol.19 , Issue.2 , pp. 193-200
    • Steinke, G.1
  • 28
    • 33751436350 scopus 로고    scopus 로고
    • DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems
    • May
    • Wainer, J., Kumar, A., Barthelmess, P. 2007. "DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems, " Information Systems (32:3), May, pp 365-384.
    • (2007) Information Systems , vol.32 , Issue.3 , pp. 365-384
    • Wainer, J.1    Kumar, A.2    Barthelmess, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.