-
1
-
-
33947368645
-
Model-based security analysis in seven steps-a guided tour to the CORAS method
-
F. Braber, I. Hogganvik, M.S. Lund, K. Stølen, and F. Vraalsen. Model-based security analysis in seven steps-a guided tour to the CORAS method. BT Technology Journal, 25: 101-117, 2007.
-
(2007)
BT Technology Journal
, vol.25
, pp. 101-117
-
-
Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stølen, K.4
Vraalsen, F.5
-
8
-
-
84976471952
-
-
URL, Accessed May
-
European Commission. Auditing directives. URL: http://ec.europa.eu/internal_market/auditing/ directives/index_en.htm, Accessed May 2010.
-
(2010)
-
-
-
12
-
-
51449100841
-
Integration of an ontological information security concept in risk aware business process management
-
G. Goluch, A. Ekelhart, S. Fenz, S. Jakoubi, S. Tjoa, and T. Mück. Integration of an ontological information security concept in risk aware business process management. In 41st Hawaii International Conference on Systems Science (HICSS-41 2008), page 377, 2008.
-
(2008)
41st Hawaii International Conference on Systems Science (HICSS-41 2008)
, pp. 377
-
-
Goluch, G.1
Ekelhart, A.2
Fenz, S.3
Jakoubi, S.4
Tjoa, S.5
Mück, T.6
-
18
-
-
84870639484
-
Deriving resource requirements applying riskaware business process modeling and simulation
-
S. Jakoubi, G. Goluch, S. Tjoa, and G. Quirchmayr. Deriving resource requirements applying riskaware business process modeling and simulation. In 16th European Conference on Information Systems, pages 1542-1554, 2008.
-
(2008)
16th European Conference on Information Systems
, pp. 1542-1554
-
-
Jakoubi, S.1
Goluch, G.2
Tjoa, S.3
Quirchmayr, G.4
-
20
-
-
33947390898
-
Operational risk analysis in business processes
-
A.K. Jallow, B. Majeed, K. Vergidis, A. Tiwari, and R.Roy. Operational risk analysis in business processes. BT Technology Journal, 25: 168-177, 2007.
-
(2007)
BT Technology Journal
, vol.25
, pp. 168-177
-
-
Jallow, A.K.1
Majeed, B.2
Vergidis, K.3
Tiwari, A.4
Roy, R.5
-
29
-
-
81455156487
-
Selecting services in business process execution-a risk-based approach
-
S. Sackmann, L. Lowis, and K. Kittel. Selecting services in business process execution-a risk-based approach. In Business Services: Konzepte, Technologien, Anwendungen, Tagung Wirtschaftsinformatik (WI09), 2009.
-
(2009)
Business Services: Konzepte, Technologien, Anwendungen, Tagung Wirtschaftsinformatik (WI09)
-
-
Sackmann, S.1
Lowis, L.2
Kittel, K.3
-
32
-
-
50349099846
-
Extension of a methodology for risk-aware business process modeling and simulation enabling process-oriented incident handling support
-
S. Tjoa, S. Jakoubi, G. Goluch, and G. Quirchmayr. Extension of a methodology for risk-aware business process modeling and simulation enabling process-oriented incident handling support. In Advanced Information Networking and Applications, pages 48-55, 2008a.
-
(2008)
Advanced Information Networking and Applications
, pp. 48-55
-
-
Tjoa, S.1
Jakoubi, S.2
Goluch, G.3
Quirchmayr, G.4
-
33
-
-
49049094901
-
Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology
-
S. Tjoa, S. Jakoubi, and G. Quirchmayr. Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology. In International Conference on Availability, Reliability and Security, pages 179-186, 2008b.
-
(2008)
International Conference on Availability, Reliability and Security
, pp. 179-186
-
-
Tjoa, S.1
Jakoubi, S.2
Quirchmayr, G.3
|