2012
DOI: 10.1007/978-3-642-28166-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Transversal Policy Conflict Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Providing that the information retrieved from software used by service providers for audit purposes is sufficiently complete, the automation of the key audit processes is a relatively small step. A considerable amount of research was recently published which could take advantage of the proposed software-based approach to information procurement, for instance, regarding the detection of requirement conflicts (Casalino et al, 2012) or the decision whether a specific control is optimal for a given combination of service, IT landscape and set of requirements (Basile et al, 2010). Building on formalized descriptions and predicate logic, van der Aalst et al (2011) present an interesting approach for performing continuous audits.…”
Section: Accessing the Information Held By Service Providersmentioning
confidence: 99%
“…Providing that the information retrieved from software used by service providers for audit purposes is sufficiently complete, the automation of the key audit processes is a relatively small step. A considerable amount of research was recently published which could take advantage of the proposed software-based approach to information procurement, for instance, regarding the detection of requirement conflicts (Casalino et al, 2012) or the decision whether a specific control is optimal for a given combination of service, IT landscape and set of requirements (Basile et al, 2010). Building on formalized descriptions and predicate logic, van der Aalst et al (2011) present an interesting approach for performing continuous audits.…”
Section: Accessing the Information Held By Service Providersmentioning
confidence: 99%