Abstract
Security and privacy in computer systems is a major issue and it is hard to find a good compromise between necessary protection and desirable open access to the internet. We propose a subject-oriented approach to computer security analysis in order to comply with the users’ needs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bettendorf, J.: Dienstordnung und Büro. In: Brambring, G., Jerschke, H.-U. (eds.) Beck’sches Notar-Handbuch, pp. 1665–1711. Beck Juristischer Verlag, München (2009)
Armbrüster, C., Preuß, N., Renner, T.: Beurkundungsgesetz und Dienstordnung für Notarinnen und Notare: Kommentar. Gruyter (2008)
Wirtz, B.W.: E-Government: Grundlagen, Instrumente, Strategien. Gabler Verlag (2010)
Dirndorfer, M.: Konzeption eines Referenzmodells für die notarielle Kommunikation. Unpublished master thesis (2011)
Eckert, C.: IT-Sicherheit: Konzepte - Verfahren - Protokolle. Oldenbourg Wissenschaftsverlag (2009)
Fleischmann, A.: What Is S-BPM? In: Buchwald, H., Fleischmann, A., Seese, D., Stary, C. (eds.) S-BPM ONE 2009. CCIS, vol. 85, pp. 85–106. Springer, Heidelberg (2010)
Johansson, J.M.: Sicherheit auf dem Prüfstand Subjekte und Sicherheitsprinzipale, http://technet.microsoft.com/de-de/query/dd297621
Kersten, H., Klett, G.: Der It Security Manager: Expertenwissen für jeden It Security Manager- von namhaften Autoren praxisnah vermittelt. Vieweg + Teubner (2008)
Bedner, M., Ackermann, T.: Schutzziele der IT-Sicherheit. Datenschutz und Datensicherheit, 323–328
Schumacher, M.: Security patterns: integrating security and systems engineering. John Wiley & Sons (2006)
Federrath, H., Pfitzmann, A.: Gliederung und Systematisierung vonSchutzzielen in IT-Systemen. Datenschutz und Datensicherheit, 704–710 (2000)
Dirndorfer, M., Handy, B.: Internalpaper on Describing and Documenting IT Security Objectives in the Notarial Context (2011)
Fleischmann, A., Stary, C.: Whom to talk to? A stakeholder perspective on business process development. Universal Access in the Information Society (2011)
Heinrich, R., Kappe, A., Paech: Modeling Quality Information within Business Process Models. Tagungsband 4. Workshop zur Software-Qualitätsmodellierung und -bewertung, pp. 4–13. Institut für Informatik der TU München (2011)
Jensen, M., Feja, S.: A Security Modeling Approach for Web-Service-based Business Processes. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 340–347 (2009)
Monakova, G., Brucker, A.D., Schaad, A.: Security and Safety of Assets in Business Processes. In: ACM 27th Symposium on Applied Computing. ACM Press, New York (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dirndorfer, M., Handy, B., Schneeberger, J., Fischer, H. (2012). Subjective Security and Safety – S-BPM as a Base for the Description of Security and Safety Objectives. In: Oppl, S., Fleischmann, A. (eds) S-BPM ONE - Education and Industrial Developments. S-BPM ONE 2012. Communications in Computer and Information Science, vol 284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29294-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-29294-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29293-4
Online ISBN: 978-3-642-29294-1
eBook Packages: Computer ScienceComputer Science (R0)