DOI: 10.3990/1.9789036531658
|View full text |Cite
|
Sign up to set email alerts
|

IT architecture-based confidentiality risk assessment in networks of organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 74 publications
0
3
0
Order By: Relevance
“…Therefore, we developed RiskREP [8]. RiskREP is built on the CRAC++ [14] and MOQARE [7] methods. The following Section 3 presents RiskREP´s meta model which explicitly considers different perspectives on security, and Section 4 illustrates RiskREP´s systematic process with extracts from an action case.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, we developed RiskREP [8]. RiskREP is built on the CRAC++ [14] and MOQARE [7] methods. The following Section 3 presents RiskREP´s meta model which explicitly considers different perspectives on security, and Section 4 illustrates RiskREP´s systematic process with extracts from an action case.…”
Section: Related Workmentioning
confidence: 99%
“…The risk expert also assesses the value of each quality goal, for example by using value models for availability [20] or confidentiality [14] and then estimates the impact or damage caused by the misuse case to these quality goals. This way we maintain the link between business goals and impact of a misuse case.…”
Section: Fig 2: Business Concepts Elicited With Riskrepmentioning
confidence: 99%
See 1 more Smart Citation