-
1
-
-
67249116525
-
-
Ser. The EE Series, Springer
-
M. Op 't Land, H. Proper, M.Waage, J. Cloo, and C. Steghuis, Enterprise Architecture-Creating Value by Informed Governance, ser. The EE Series. Springer, 2008.
-
(2008)
Enterprise Architecture-Creating Value by Informed Governance
-
-
Op 't Land, M.1
Proper, H.2
Waage, M.3
Cloo, J.4
Steghuis, C.5
-
2
-
-
84892513789
-
-
Ser. LNBIP 10 Springer
-
J. L. G. Dietz, A. Albani, and J. Barjis, Eds., Advances in EE I, 4th International Workshop CIAO! and 4th International Workshop EOMAS, held at CAiSE 2008, Montpellier, France, June 16-17, 2008. Proc., ser. LNBIP, vol. 10. Springer, 2008.
-
(2008)
Advances in EE I, 4th International Workshop CIAO! and 4th International Workshop EOMAS, Held at CAiSE 2008, Montpellier, France, June 16-17, 2008. Proc
-
-
Dietz, J.L.G.1
Albani, A.2
Barjis, J.3
-
3
-
-
84875612370
-
-
The Hague, Netherlands: Academic Service-SDU
-
R. Wieringa, P. v. Eck, C. Steghuis, and H. Proper, Competences of IT Architects. The Hague, Netherlands: Academic Service-SDU, 2008. [Online]. Available: http://www.sdu.nl/catalogus/9789012580878
-
(2008)
Competences of IT Architects
-
-
Wieringa, R.1
Eck, P.V.2
Steghuis, C.3
Proper, H.4
-
4
-
-
72849117197
-
-
The Open Group, Van Haren Publishing, Zaltbommel, The Netherlands
-
The Open Group, TOGAF Version 9. Van Haren Publishing, Zaltbommel, The Netherlands, 2009.
-
(2009)
TOGAF Version 9
-
-
-
5
-
-
78649953961
-
-
Object Management Group, Needham, Massachusetts, Tech. Rep. dtc/06-08-03 August
-
Object Management Group, "Business Motivation Model (BMM) Specification," Needham, Massachusetts, Tech. Rep. dtc/06-08-03, August 2006.
-
(2006)
Business Motivation Model (BMM) Specification
-
-
-
6
-
-
84878800969
-
-
Project Risk Management Guidance for WSDOT Projects, Tech. Rep., July 2010
-
Washington State Department of Transportation, "Project Risk Management Guidance for WSDOT Projects," Tech. Rep., July 2010.
-
Washington State Department of Transportation
-
-
-
7
-
-
78650758022
-
Attackdefense trees and two-player binary zero-sum extensive form games are equivalent
-
Springer
-
B. Kordy, S. Mauw, M. Melissen, and P. Schweitzer, "Attackdefense trees and two-player binary zero-sum extensive form games are equivalent," in Proc. of the First international conference on Decision and game theory for security, ser. GameSec'10. Springer, 2010, pp. 245-256.
-
Proc. of the First International Conference on Decision and Game Theory for Security, Ser. GameSec'10
, vol.2010
, pp. 245-256
-
-
Kordy, B.1
Mauw, S.2
Melissen, M.3
Schweitzer, P.4
-
9
-
-
38049144769
-
Strategic games on defense trees
-
Springer
-
S. Bistarelli, M. Dall'Aglio, and P. Peretti, "Strategic games on defense trees," in Proc. of the 4th international conference on Formal aspects in security and trust, ser. FAST'06. Springer, 2007, pp. 1-15.
-
(2007)
Proc. of the 4th International Conference on Formal Aspects in Security and Trust, Ser. FAST'06
, pp. 1-15
-
-
Bistarelli, S.1
Dall'aglio, M.2
Peretti, P.3
-
10
-
-
33750958509
-
Defense trees for economic evaluation of security investments
-
S. Bistarelli, F. Fioravanti, and P. Peretti, "Defense trees for economic evaluation of security investments," in ARES, 2006, pp. 416-423.
-
(2006)
ARES
, pp. 416-423
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
12
-
-
8644282175
-
Concepts for modeling enterprise architectures
-
H. Jonkers, M. Lankhorst, R. v. Buuren, S. Hoppenbrouwers, M. Bonsangue, and L. Van der Torre, "Concepts for Modeling Enterprise Architectures," International Journal of Cooperative Information Systems, vol. 13, no. 3, pp. 257-288, 2004.
-
(2004)
International Journal of Cooperative Information Systems
, vol.13
, Issue.3
, pp. 257-288
-
-
Jonkers, H.1
Der Van Torre, L.2
Bonsangue, M.3
Hoppenbrouwers, S.4
Buuren, V.R.5
Lankhorst, M.6
-
14
-
-
70450142818
-
-
Amsterdam, The Netherlands: Self Published
-
A. Osterwalder and Y. Pigneur, Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers. Amsterdam, The Netherlands: Self Published, 2009.
-
(2009)
Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers
-
-
Osterwalder, A.1
Pigneur, Y.2
-
15
-
-
84886736330
-
-
August 2010, The Open Group, White Paper
-
W. Engelsman, H. Jonkers, and D. Quartel, "ArchiMate Extention for Modeling and Managing Motivation, Principles and Requirements in TOGAF," The Open Group, White paper, August 2010.
-
Archimate Extention for Modeling and Managing Motivation, Principles and Requirements in Togaf
-
-
Engelsman, W.1
Jonkers, H.2
Quartel, D.3
-
16
-
-
84892325633
-
-
Van Haren Publishing, Zaltbommel, The Netherlands
-
The Open Group-TOGAF Version 9. Van Haren Publishing, Zaltbommel, The Netherlands, 2009.
-
(2009)
The Open Group-TOGAF Version 9
-
-
-
17
-
-
33748450931
-
The economics of insurance intermediaries
-
J. Cummins and N. Doherty, "The economics of insurance intermediaries," The Journal of Risk and Insurance, vol. 73, no. 3, pp. 359-396, 2006.
-
(2006)
The Journal of Risk and Insurance
, vol.73
, Issue.3
, pp. 359-396
-
-
Cummins, J.1
Doherty, N.2
-
18
-
-
84864250079
-
-
The Open Group, White Paper, Spring 2012
-
H. Jonkers, I. Band, and D. Quartel, "The ArchiSurance Case Study," The Open Group, White Paper, Spring 2012.
-
The ArchiSurance Case Study
-
-
Jonkers, H.1
Band, I.2
Quartel, D.3
-
19
-
-
77952324838
-
-
ISO 31000. Geneva: International Organization for Standardization
-
ISO 31000, Risk management Principles and guidelines. Geneva: International Organization for Standardization, 2009.
-
(2009)
Risk Management Principles and Guidelines
-
-
-
20
-
-
78649573321
-
-
ISO 31010. Geneva: International Organization for Standardization
-
ISO 31010, Risk management Risk assessment techniques. Geneva: International Organization for Standardization, 2009.
-
(2009)
Risk Management Risk Assessment Techniques
-
-
-
22
-
-
45849117958
-
Alignment of misuse cases with security risk management
-
IEEE Computer Society
-
R. Matulevicius, N. Mayer, and P. Heymans, "Alignment of misuse cases with security risk management," in Proceedings of the 4th Symposium on Requirements Engineering for Information Security (SREIS'08), in conjunction with the 3rd International Conference of Availability, Reliability and Security (ARES'08). IEEE Computer Society, 2008, p. 13971404.
-
(2008)
Proceedings of the 4th Symposium on Requirements Engineering for Information Security (SREIS'08), in Conjunction with the 3rd International Conference of Availability, Reliability and Security (ARES'08)
, pp. 13971404
-
-
Matulevicius, R.1
Mayer, N.2
Heymans, P.3
-
23
-
-
84858311224
-
Aligning mal-activity diagrams and security risk management for security requirements definitions
-
LNCS, B. Regnell and D. Damian, Eds Springer, Jan
-
M. J. M. Chowdhury, R. Matulevicius, G. Sindre, and P. Karpati, "Aligning mal-activity diagrams and security risk management for security requirements definitions," in Requirements Engineering: Foundation for Software Quality, ser. LNCS, B. Regnell and D. Damian, Eds. Springer, Jan. 2012, no. 7195, pp. 132-139.
-
(2012)
Requirements Engineering: Foundation for Software Quality, ser
, vol.7195
, pp. 132-139
-
-
Chowdhury, M.J.M.1
Matulevicius, R.2
Sindre, G.3
Karpati, P.4
-
25
-
-
45849134150
-
Adapting secure tropos for security risk management during early phases of the information systems development
-
Springer
-
R. Matulevicius, N. Mayer, H. Mouratidis, E. Dubois, P. Heymans, and N. Genon, "Adapting secure tropos for security risk management during early phases of the information systems development," in Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE '08). Springer, 2008, pp. 541-555.
-
(2008)
Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE ' 08)
, pp. 541-555
-
-
Matulevicius, R.1
Mayer, N.2
Mouratidis, H.3
Dubois, E.4
Heymans, P.5
Genon, N.6
-
27
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
May
-
P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, "Tropos: An agent-oriented software development methodology," Autonomous Agents and Multi-Agent Systems, vol. 8, no. 3, pp. 203-236, May 2004.
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
28
-
-
80455136037
-
-
The Open Group, White Paper W192, November
-
H. Jonkers, H. Proper, and M. Turner, "TOGAF and Archi-Mate: A Future Together," The Open Group, White Paper W192, November 2009.
-
(2009)
TOGAF and Archi-Mate: A Future Together
-
-
Jonkers, H.1
Proper, H.2
Turner, M.3
|