-
1
-
-
34848920878
-
Necessary measures: Metric-driven information security risk assessment and decision making
-
Baker, W.H., Rees, L.P., and Tippett, P.S. (2007). Necessary Measures: Metric-driven Information Security Risk Assessment and Decision Making. Communications of the ACM, 50 (10), 101-106.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 101-106
-
-
Baker, W.H.1
Rees, L.P.2
Tippett, P.S.3
-
2
-
-
84870645800
-
-
Basel Committee on Banking Supervision Working Paper 8, September 2001. URL 03-28
-
Basel Committee on Banking Supervision (2001). Regulatory Treatment of Operational Risk. Working Paper 8, September 2001. URL: http://www.bis.org/publ/ bcbs-wp8.pdf (2008-03-28).
-
(2001)
Regulatory Treatment of Operational Risk
-
-
-
3
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
Springer, Berlin
-
Basin, D., Mödersheim, S., and Vigano, L. (2003). An On-The-Fly Model-Checker for Security Protocol Analysis. In Proceedings of the ESORICS 2003, Lecture Notes in Computer Science, 2808, pp. 253-270, Springer, Berlin.
-
(2003)
Proceedings of the ESORICS 2003, Lecture Notes in Computer Science
, vol.2808
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Vigano, L.3
-
5
-
-
0003427441
-
-
IEEE Computer Society Press, Washington, D.C
-
Boehm, B.W. (1989). Software risk management. IEEE Computer Society Press, Washington, D.C.
-
(1989)
Software Risk Management
-
-
Boehm, B.W.1
-
6
-
-
84870336809
-
-
URL 11-30
-
BSI - Federal Office for Information Security (2005). IT-Grundschutz Manual. URL: http://www.bsi.de/english/gshb/manual/download/pdfversion.zip (2007-11-30).
-
(2005)
IT-Grundschutz Manual
-
-
-
7
-
-
4243109556
-
A model for evaluating IT security investments
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. (2004). A Model for Evaluating IT Security Investments. Communications of the ACM, 47 (7), 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
9
-
-
3042585572
-
The next step in web services
-
Curbera, F., Khalaf, R., Mukhi, N., Tai, S., and Weerawarana, S. (2003). The Next Step in Web Services. Communications of the ACM, 46 (10), 29-35.
-
(2003)
Communications of the ACM
, vol.46
, Issue.10
, pp. 29-35
-
-
Curbera, F.1
Khalaf, R.2
Mukhi, N.3
Tai, S.4
Weerawarana, S.5
-
10
-
-
0038080575
-
Workflow technology
-
(Beaudouin-Lafon, M. Ed.) John Wiley & Sons, Chichester
-
Ellis, C. A. (1999). Workflow Technology. In Computer Supported Co-operative Work (Beaudouin-Lafon, M. Ed.), pp. 29-54, John Wiley & Sons, Chichester.
-
(1999)
Computer Supported Co-operative Work
, pp. 29-54
-
-
Ellis, C.A.1
-
12
-
-
0031631068
-
A conceptual framework for information security management
-
Finne, T. (1998). A conceptual framework for information security management. Computers & Security, 17 (4), 303-307.
-
(1998)
Computers & Security
, vol.17
, Issue.4
, pp. 303-307
-
-
Finne, T.1
-
13
-
-
0035300743
-
A taxonomy of business process modelling and information systems modelling techniques
-
Giaglis, G.M. (2001). A taxonomy of business process modelling and information systems modelling techniques. International Journal of Flexible Manufacturing Systems, 13 (2), 209-228.
-
(2001)
International Journal of Flexible Manufacturing Systems
, vol.13
, Issue.2
, pp. 209-228
-
-
Giaglis, G.M.1
-
15
-
-
3242808612
-
-
Computer Security Institute
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W., and Richardson, R. (2006). CSI/FBI Computer Crime and Security Survey 2006. Computer Security Institute.
-
(2006)
CSI/FBI Computer Crime and Security Survey 2006
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
22
-
-
33646202823
-
-
Prentice Hall, Upper Saddle River
-
Krafzig, D., Banke, K., and Slama, D. (2005). Enterprise SOA. Prentice Hall, Upper Saddle River.
-
(2005)
Enterprise SOA
-
-
Krafzig, D.1
Banke, K.2
Slama, D.3
-
23
-
-
84997771370
-
-
Princeton University Press, Princeton
-
McNeil, A., Frey, R., and Embrechts, P. (2005). Quantitative Risk Management: Concepts Techniques and Tools. Princeton University Press, Princeton.
-
(2005)
Quantitative Risk Management: Concepts Techniques and Tools
-
-
McNeil, A.1
Frey, R.2
Embrechts, P.3
-
24
-
-
84871107909
-
The future of business - Aligning business and IT to create an enduring impact on industry
-
URL 03-28
-
Mills, S. (2007). The future of business - Aligning business and IT to create an enduring impact on industry. IBM, Thought leadership paper. URL: ftp://ftp.software.ibm.com/software/soa/pdf/future-of-business.pdf (2008-03-28).
-
(2007)
IBM, Thought Leadership Paper
-
-
Mills, S.1
-
26
-
-
0013305253
-
-
Technology, Infrastructure, Economy. Addison Wesley Longman, New York
-
Müller, G. and Rannenberg, K. (1999). Multilateral Security in Communications, Vol. 3: Technology, Infrastructure, Economy. Addison Wesley Longman, New York.
-
(1999)
Multilateral Security in Communications
, vol.3
-
-
Müller, G.1
Rannenberg, K.2
-
27
-
-
84869455364
-
Analysing business processes
-
March 2003
-
Palm, J. (2003). Analysing Business Processes. Risk, March 2003, 23-25.
-
(2003)
Risk
, pp. 23-25
-
-
Palm, J.1
-
28
-
-
34147190861
-
Risks of risk-based security
-
Parker, D.B. (2007). Risks of risk-based security. Communications of the ACM, 50 (3), 120.
-
(2007)
Communications of the ACM
, vol.50
, Issue.3
, pp. 120
-
-
Parker, D.B.1
-
31
-
-
70349363570
-
Assessing the effects of IT changes on IT risk - A business process-oriented view
-
(Bichler, M. et al. (Eds.) GITO, Berlin
-
Sackmann, S. (2008). Assessing the effects of IT changes on IT risk - A business process-oriented view. In Multikonferenz Wirtschaftsinformatik MKWI'08 (Bichler, M. et al. (Eds.), pp. 1137-1148, GITO, Berlin.
-
(2008)
Multikonferenz Wirtschaftsinformatik MKWI'08
, pp. 1137-1148
-
-
Sackmann, S.1
-
32
-
-
84989078094
-
Strategic flexibility in product competition
-
Sanchez, R. (1995). Strategic Flexibility in Product Competition. Strategic Management Journal, 16, 135-159.
-
(1995)
Strategic Management Journal
, vol.16
, pp. 135-159
-
-
Sanchez, R.1
-
34
-
-
0002670359
-
Attack trees
-
December 1999
-
Schneier, B. (1999). Attack Trees. Dr. Dobb's Journal, December 1999, 24 (12), 21-29.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
35
-
-
0012889295
-
A language-based approach to security
-
Schneider, F.B., Morrisett, G., and Harper, R. (2001). A Language-Based Approach to Security. Lecture Notes in Computer Science, 2000, 86-101.
-
(2000)
Lecture Notes in Computer Science
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
-
37
-
-
63749131964
-
-
John Wiley & Sons, Hoboken
-
Tarantino, A. (2006). Manager's Guide to Compliance: Sarbanes-Oxley, COSO, ERM, COBIT, IFRS, BASEL II, OMB A-123, ASX 10, OECD Principles, Turnbull Guidance, Best Practices, and Case Studies. John Wiley & Sons, Hoboken.
-
(2006)
Manager's Guide to Compliance: Sarbanes-Oxley, COSO, ERM, COBIT, IFRS, BASEL II, OMB A-123, ASX 10, OECD Principles, Turnbull Guidance, Best Practices, and Case Studies
-
-
Tarantino, A.1
-
38
-
-
0004269078
-
-
U.S. Nuclear Regulatory Commission. NUREG-0492, Washington, D.C
-
Vesely, W.E., Goldberg, F.F., Roberts, N.H., and Haasl, D.F. (1981). Fault Tree Handbook. U.S. Nuclear Regulatory Commission. NUREG-0492, Washington, D.C.
-
(1981)
Fault Tree Handbook
-
-
Vesely, W.E.1
Goldberg, F.F.2
Roberts, N.H.3
Haasl, D.F.4
-
39
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
Whitman, M. (2003). Enemy at the gate: Threats to information security. Communications of the ACM, 46 (8), 91-95.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.1
|