{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:52:33Z","timestamp":1725490353936},"publisher-location":"London","reference-count":36,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781846288579"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-1-84628-858-6_3","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:04:33Z","timestamp":1188306273000},"page":"27-38","source":"Crossref","is-referenced-by-count":4,"title":["An Ontology for Requirements Analysis of Managers\u2019 Policies in Financial Institutions"],"prefix":"10.1007","author":[{"given":"C.","family":"Feltus","sequence":"first","affiliation":[]},{"given":"A.","family":"Rifaut","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"M. Hammer (1996) Beyond Reengineering: How the Process-Centered Organization is Changing Our Lives. HarperBusiness."},{"issue":"11","key":"3_CR2","doi-asserted-by":"publisher","first-page":"2521:2546","DOI":"10.1080\/00207540210132733","volume":"40","author":"A. Gunasekaran","year":"2002","unstructured":"A. Gunasekaran and B. Kobu (2002) Modelling and analysis of business process reengineering, Int. J. Prod. Res., 2002, vol. 40, no. 11, 2521:2546","journal-title":"Int. J. Prod. Res."},{"key":"3_CR3","unstructured":"F. Baader et al., editors. (2003) The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press."},{"key":"3_CR4","unstructured":"IFRS: International Financial Reporting Standards, IASCF, USA. SoX: Sarbanes Oxley Act of 2002, USA. COSO: Internal Control \u2014 Integrated Framework, CSOTC."},{"key":"3_CR5","unstructured":"BIS (2004) International Convergence of Capital Measurement and Capital Standards."},{"key":"3_CR6","first-page":"979","volume":"45","author":"R. Crook","year":"2003","unstructured":"R. Crook, D. Ince, B. Nuseibeh (2003) Modelling access policies using roles in requirements engineering, Information and Software Technology, 45:979\u2013991.","journal-title":"Modelling access policies using roles in requirements engineering"},{"key":"3_CR7","volume-title":"A survey of policy specification approaches","author":"N. Damianou","year":"2002","unstructured":"N. Damianou, A. Bandara, M. Sloman and E. Lupu, (2002) A survey of policy specification approaches, Imperial College, London"},{"key":"3_CR8","unstructured":"A. Rifaut, M. Picard and B. Di Renzo (2006) ISO\/IEC 15504 Process Improvement to Support Basel II Compliance of Operational Risk Management in Financial Institutions, International Conference SPiCE 2006"},{"key":"3_CR9","volume-title":"Planning and Control Systems: A Framework for Analysis","author":"R.N. Anthony","year":"1965","unstructured":"R.N. Anthony (1965) Planning and Control Systems: A Framework for Analysis. Harward University, Boston, USA."},{"key":"3_CR10","unstructured":"A. Rifaut and C. Feltus (2006) Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO\/IEC 15504 Approach, REMO2V, CAISE06, Luxembourg."},{"key":"3_CR11","unstructured":"CSSF (2006) http:\/\/www.cssf.lu\/index.php?id=130"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"A. Rifaut (2005) Goal-Driven Requirements Engineering for Supporting the ISO 15504 Assessment Process, EuroSPI 2005, Budapest.","DOI":"10.1007\/11586012_15"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"J. Henderson and N. Venkatraman (1999) Strategic alignment: Leveraging technology for transforming organizations IBM Systems Journal: 38.","DOI":"10.1147\/SJ.1999.5387096"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Osterwalder and Pigneur (2005) An Ontology for e-business models. In Value Creation from E-Business Models, Wendy Currie ed., Butterworth-Heinenmann.","DOI":"10.1016\/B978-075066140-9\/50006-0"},{"key":"3_CR15","unstructured":"W. Robson (1997) Strategic Management and Information Systems, Pitman."},{"key":"3_CR16","unstructured":"Chaffey et al. (2005) Business Information Systems: Technology, Development and Management for the E-business, Prentice Hall."},{"key":"3_CR17","first-page":"124","volume":"102","author":"E. Kavakli","year":"2004","unstructured":"E. Kavakli and P. Loucopoulos (2004) Goal Driven Requirements Engineering: Analysis and Critique of Current Methods, in Information Modeling Methods and Methodologies (Adv. topics of Database Research), 102:124","journal-title":"Information Modeling Methods and Methodologies (Adv. topics of Database Research)"},{"key":"3_CR18","unstructured":"Van Solingen (1999) The Goal\/Question\/Metric Method: A Practical Guide For Quality Improvement of Software Development McGraw-Hill,."},{"key":"3_CR19","unstructured":"P. Giorgini, N. Maiden, J. Mylopoulos, E. Yu (eds.) (2006) \u201cTropos\/i*: Applications, variations and Extensions\u201d, Cooperative Information Systems Series, MIT Press."},{"key":"3_CR20","unstructured":"R. Kaplan and D. Norton (1996) The Balanced Scorecard. Harvard Bus. School Press"},{"key":"3_CR21","unstructured":"B. Di Renzo, M. Hillairet, M. Picard, A. Rifaut, C. Bernard, D. Hagen, P. Maar, D. Reinard (2005) Operational Risk management in Financial Institutions: Process Assessment in Concordance with Basel II, International Conference SPiCE 2005."},{"key":"3_CR22","unstructured":"Rifaut A., (2005) An assessment method compliant to the Basel II regulation on operational risk management, Proceedings of the conference New developments in Financial Planning Hochschule, Liechtenstein, December 2005."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"J. Dobson and J. McDermid.(1989) A Framework for Expressing Models of Security Policy. in IEEE Symposium on Security and Privacy. Oakland, CA.","DOI":"10.1109\/SECPRI.1989.36297"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"J. Dobson (1993) New Security Paradigms: What Other Concepts Do We Need as Well? In 1st New Security Paradigms Workshop. Little Compton: IEEE Press.","DOI":"10.1145\/283751.283765"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.entcs.2004.08.067","volume":"133","author":"C. Ponsard","year":"2005","unstructured":"C. Ponsard, P. Massonet, A. Rifaut, J.F. Molderez, A.l van Lamsweerde, H. Tran Van (2005) Early Verification and Validation of Mission Critical Systems. Electr. Notes Theor. Comput. Sci. 133: 237\u2013254","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"A. Rifaut, P. Massonet, J.F. Molderez, C. Ponsard, P. Stadnik, A. van Lamsweerde, H. Tran Van (2003) FAUST: Formal Analysis Using Specification Tools. RE 2003: 350","DOI":"10.1109\/ICRE.2003.1232781"},{"key":"3_CR27","unstructured":"SWI-Prolog-XPCE Semantic Web Library package (http:\/\/www.swi-prolog.org)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"T. Latvala, A. Biere, K. Heljanko, T.A.. Junttila, (2005) Simple Is Better: Efficient Bounded Model Checking for Past LTL. VMCAI 2005:380\u2013395","DOI":"10.1007\/978-3-540-30579-8_25"},{"key":"3_CR29","unstructured":"Kececioglu, D. (1991) Reliability Engineering Handbook, Vol. 2, Prentice Hall."},{"key":"3_CR30","unstructured":"A. Schaad and J. D. Moffett (2002) Delegation of Obligations, POLICY 2002."},{"key":"3_CR31","unstructured":"Basel Committee on Banking Supervision (2002) The 2002 Loss Data Collection Exercise for Operational Risk: Summary of the Data Collected. Basel."},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/49.257932","volume":"11\u20139","author":"J. Moffett","year":"1993","unstructured":"J. Moffett and M. Sloman (1993) Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communication, 11\u20139: 1404\u20131414.","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"3_CR33","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"J. Park and R. Sandhu (2004) The UCON-ABC Usage Control Model, ACM Transactions on Information and System Security, Vol. 7, No. 1: 128\u2013174.","journal-title":"ACM Transactions on Information and System Security"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"X. Zhang, M. Nakae, M.J. Covington, R. Sandhu (2005) A Usage-based Authorization Framework for Collaborative Computing Systems. ACM, SACMAT","DOI":"10.1145\/1133058.1133084"},{"key":"3_CR35","unstructured":"S. Hawke (2003) surnia \u2014 OWL full reasoner based on otter, http:\/\/www.w3.org\/2003\/08\/surnia\/"},{"key":"3_CR36","unstructured":"J. A. Kalman (2001) Automated Reasoning with Otter, Rinton Press."}],"container-title":["Enterprise Interoperability II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-84628-858-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T18:09:17Z","timestamp":1619892557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-84628-858-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9781846288579"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-1-84628-858-6_3","relation":{},"subject":[]}}