2009 20th International Workshop on Database and Expert Systems Application 2009
DOI: 10.1109/dexa.2009.12
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Security Patterns into the Electronic Invoicing Process

Abstract: Abstract-The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not optimally supported despite the fact that recent studies indicate a high potential to save costs. Within this paper we identify the main obstacles and propose a multi-stage solution. Therein we classify the e-invoicing process using common security objectives and, since the process includes many security related elements, propose … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…In our previous work [2], we analyzed the security aspects of the electronic invoice process, focusing on the affected security objectives. There we proposed an approach to relate security objectives to security patterns, leading to a set of patterns that can be used to realize a solution for the security problem.…”
Section: Reference Model Refinementmentioning
confidence: 99%
See 4 more Smart Citations
“…In our previous work [2], we analyzed the security aspects of the electronic invoice process, focusing on the affected security objectives. There we proposed an approach to relate security objectives to security patterns, leading to a set of patterns that can be used to realize a solution for the security problem.…”
Section: Reference Model Refinementmentioning
confidence: 99%
“…Figure 3 (a) shows an extract of our classification scheme, presented in [2]. Therein security objectives are used to map appropriate security patterns to the e-invoice processes.…”
Section: Reference Model Refinementmentioning
confidence: 99%
See 3 more Smart Citations