메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Business process-based valuation of IT-security

Author keywords

Business process management; Valuation of secure business processes; Value based security

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; COST BENEFIT ANALYSIS; ENGINEERING RESEARCH; ENTERPRISE RESOURCE MANAGEMENT; SECURITY OF DATA; SOFTWARE DESIGN;

EID: 84994725444     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1083091.1083099     Document Type: Conference Paper
Times cited : (23)

References (21)
  • 1
    • 12344308304 scopus 로고    scopus 로고
    • Basic concepts and taxonomy of dependable and secure computing
    • Avizienis, Algirdas; et.al.: Basic Concepts and Taxonomy of Dependable and Secure Computing; IEEE Transactions on dependable and secure computing, Vol. 1, No. 1; 2004.
    • (2004) IEEE Transactions on Dependable and Secure Computing , vol.1 , Issue.1
    • Avizienis, A.1
  • 2
    • 85027503118 scopus 로고    scopus 로고
    • BOC: www.boc-eu.com
  • 4
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, Katherine; Lawrence A. Gordon, Martin P. Loeb, and Lei Zhou, "The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence From the Stock Market", Journal of Computer Security, vol. 11, issue 3, 2003, pp. 431-448.
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 5
    • 2142850601 scopus 로고
    • Computer matching by government agencies: The failure of cost/benefit analysis as a control mechanism
    • Clarke, R. Computer matching by government agencies: The failure of cost/benefit analysis as a control mechanism. Information Infrastructure and Policy 4; 1995.
    • (1995) Information Infrastructure and Policy , vol.4
    • Clarke, R.1
  • 8
    • 0242521608 scopus 로고
    • Federal Information Processing Standards, National Institute of Standards and Technology, FIPS PUB 191, Nov
    • Federal Information Processing Standards. Guideline for the Analysis of Local Area Network Security. National Institute of Standards and Technology, FIPS PUB 191, Nov. 1994.
    • (1994) Guideline for the Analysis of Local Area Network Security
  • 10
    • 85027507715 scopus 로고    scopus 로고
    • IDS Scheer: www.ids-scheer.de
    • IDS Scheer
  • 11
    • 33750939853 scopus 로고    scopus 로고
    • SMM - Assessing a company's IT-Security
    • Kurrek, H.: SMM - Assessing a Company's IT-Security In: ERCIM News, 2002, Nr. 49.
    • (2002) ERCIM News , Issue.49
    • Kurrek, H.1
  • 13
    • 4243150787 scopus 로고    scopus 로고
    • Analyzing security costs
    • June
    • Mercuri, Rebecca T.: Analyzing Security Costs; Communications of the ACM; June 2003/Vol. 46, No. 6.
    • (2003) Communications of the ACM , vol.46 , Issue.6
    • Mercuri, R.T.1
  • 14
    • 0021535278 scopus 로고
    • Measuring computer system security using software security metrics
    • Finch, J. H. and Dougall, E. G. Eds, Elsevier Science Publisher, Barking
    • Murine, G. E. and Carpenter, C. L. (1984), "Measuring computer system security using software security metrics", in Finch, J. H. and Dougall, E. G. (Eds), Computer Security: A Global Challenge, Elsevier Science Publisher, Barking.
    • (1984) Computer Security: A Global Challenge
    • Murine, G.E.1    Carpenter, C.L.2
  • 15
    • 85027508253 scopus 로고    scopus 로고
    • National Institute of Standards and Technologies
    • National Institute of Standards and Technologies; 1979 FIPS publication (#65).
    • 1979 FIPS Publication (#65)
  • 18
    • 0011524195 scopus 로고    scopus 로고
    • SSE-CMM (1998), The Model, v2.0, www.sse-cmm.org.
    • (1998) The Model, v2.0
  • 20
    • 85027490287 scopus 로고    scopus 로고
    • The ISO 17799 directory can be found at
    • The ISO 17799 directory can be found at http://www.iso-17799.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.