EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Security Patterns"
Narrow search

Narrow search

Year of publication
Subject
All
Security Patterns 2 Access Control 1 Airline 1 Airline turnaround process 1 Aviation safety 1 Business process management 1 Corporate security 1 Crisis management 1 Cyber Behaviour 1 Cyber Security Patterns 1 Data security 1 Datensicherheit 1 Design Patterns 1 Fluggesellschaft 1 Goal Models 1 Krisenmanagement 1 Loyalty Programs 1 Luftverkehrssicherheit 1 Model Transformations 1 Privacy 1 Prozessmanagement 1 RBAC 1 Risikomanagement 1 Risk management 1 Security 1 Security patterns 1 Security requirements engineering 1 Security risk management 1 Social Networking Sites 1 Students Participation 1 Unternehmenssicherheit 1 Usability 1 User Interface 1 computer security patterns 1 secure information systems 1 software engineering methodologies 1
more ... less ...
Online availability
All
Undetermined 4 Free 1
Type of publication
All
Article 5
Type of publication (narrower categories)
All
Article in journal 1 Aufsatz in Zeitschrift 1 Congress Report 1
Language
All
English 5
Author
All
Alemerien, Khalid 1 Chmielarz, Witold 1 Hosseinian-Far, Amin 1 Hu, Zhenjiang 1 Kaiya, Haruhiko 1 Matulevičius, Raimundas 1 Mouratidis, Haralambos 1 Norta, Alex 1 Samarütel, Silver 1 Szumski, Oskar 1 Washizaki, Hironori 1 Xiong, Yingfei 1 Yoshioka, Nobukazu 1 Yu, Yijun 1
more ... less ...
Published in...
All
Business & information systems engineering : BISE ; the international journal of Wirtschaftsinformatik 1 International Journal of Ambient Computing and Intelligence (IJACI) 1 International Journal of Secure Software Engineering (IJSSE) 1 International Journal of Technology and Human Interaction (IJTHI) 1
Source
All
Other ZBW resources 3 BASE 1 ECONIS (ZBW) 1
Showing 1 - 5 of 5
Cover Image
Cyber Security Patterns Students Behavior and Their Participation in Loyalty Programs
Chmielarz, Witold; Szumski, Oskar - In: International Journal of Ambient Computing and … 9 (2018) 2, pp. 16-31
Despite of the number of public advice campaigns, researchers have found that individuals still engage in risky cyber behaviour. The first part of this article is focused on the general approach to the cyber security and safety of personal data kept and processed by different entities from the...
Persistent link: https://www.econbiz.de/10012042673
Saved in:
Cover Image
Security requirements elicitation from airline turnaround processes
Matulevičius, Raimundas; Norta, Alex; Samarütel, Silver - In: Business & information systems engineering : BISE ; the … 60 (2018) 1, pp. 3-20
Persistent link: https://www.econbiz.de/10011873373
Saved in:
Cover Image
Goal Modelling for Security Problem Matching and Pattern Enforcement
Washizaki, Hironori; Yu, Yijun; Kaiya, Haruhiko; … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 42-57
knowledge and hence security patterns. Detecting a security problem using the patterns in requirements models may lead to its … early prevention. In this article, the authors have provided an overview of security patterns in the past two decades …
Persistent link: https://www.econbiz.de/10012048088
Saved in:
Cover Image
User-Friendly Security Patterns for Designing Social Network Websites
Alemerien, Khalid - In: International Journal of Technology and Human … 13 (2017) 1, pp. 39-60
development process. This paper proposes a set of user-friendly security patterns to help SNS developers to design interactive …
Persistent link: https://www.econbiz.de/10012048462
Saved in:
Cover Image
Analysing Security Requirements of Information Systems using Tropos
Mouratidis, Haralambos - 2006
Security is an important issue when developing complex information systems, however very little work has been done in integrating security concerns during the analysis of information systems. Current methodologies fail to adequately integrate security and systems engineering, basically because...
Persistent link: https://www.econbiz.de/10009463261
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...