{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:34:52Z","timestamp":1725528892781},"publisher-location":"Wiesbaden","reference-count":25,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_24","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"231-241","source":"Crossref","is-referenced-by-count":0,"title":["Managing business compliance using model-driven security management"],"prefix":"10.1007","author":[{"given":"Ulrich","family":"Lang","sequence":"first","affiliation":[]},{"given":"Rudolf","family":"Schreiner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Common Criteria Portal website, www.commoncriteriaportal.org, 2008"},{"key":"24_CR2","unstructured":"Eclipse project web site, www.eclipse.org"},{"key":"24_CR3","unstructured":"Eclipse Modeling Framework website, www.eclipse.org\/modeling\/emf"},{"key":"24_CR4","unstructured":"Gartner: Tear Down Application Authorization Silos With Authorization Management Solutions (G00147801), 31 May 2007"},{"key":"24_CR5","unstructured":"Gartner: Model-Driven Security: Enabling a Real-Time, Adaptive Security Infrastructure (G00151498), 21 September 2007"},{"key":"24_CR6","unstructured":"Gartner: Hype Cycle for Information Security, 2007 (G00150728), 4 September 2007"},{"key":"24_CR7","unstructured":"Gartner: Cisco Buys Securent for Policy Management, and Relevance (G00153181), 5 November 2007"},{"key":"24_CR8","unstructured":"Gartner website, www.gartner.com, 2008"},{"key":"24_CR9","unstructured":"Gartner: Cool Vendors in Application Security and Authentication, 2008 (G00156005), 4 April 2008"},{"key":"24_CR10","unstructured":"Gartner: Hype Cycle for Identity and Access Management Technologies, 2008 (G00158499), 30 June 2008"},{"key":"24_CR11","unstructured":"Gartner: Hype Cycle for Context-Aware Computing, 2008 (G00158162), 1 July 2008"},{"key":"24_CR12","unstructured":"IT Governance Institute: COBIT 4.1 Excerpt, Executive Summary, 2007"},{"key":"24_CR13","unstructured":"Public Law 104\u2013191: Health Insurance Portability and Accountability Act of 1996, 21. Aug 1996"},{"key":"24_CR14","unstructured":"Health Level Seven web site, www.hl7.org"},{"key":"24_CR15","unstructured":"Intalio product web site, www.intalio.com, 2008"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Lang, Ulrich and Schreiner, Rudolf: Integrated IT Security: Air-Traffic Management Case Study. ISSE 2005 Conference Budapest, Springer, 2005","DOI":"10.1007\/978-3-322-85237-3_26"},{"key":"24_CR17","unstructured":"Model Driven Security web site, www. modeldrivensecurity.org, 2008"},{"key":"24_CR18","unstructured":"OASIS Consortium: Web Services Business Process Execution Language, 11 Apr 2007"},{"key":"24_CR19","unstructured":"OASIS Consortium: XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version 2.0, 1 Feb 2005"},{"key":"24_CR20","unstructured":"Object Management Group, MDA web site, www.omg.org\/mda"},{"key":"24_CR21","unstructured":"ObjectSecurity: OpenPMF 2.0 Model Driven Security Management product website, www.openpmf.com, 2008"},{"key":"24_CR22","unstructured":"ObjectSecurity website: Customer list with case studies and endorsements, www.objectsecurity.com, 2008"},{"key":"24_CR23","unstructured":"Schreiner, R, Lang, U, Ritter, T, Reznik, J, Building Secure and Interoperable ATC Systems, Eurocontrol INO Workshop 2006"},{"key":"24_CR24","unstructured":"ObjectSecurity: SecureMiddleware website, www.securemiddleware.org, 2008"},{"key":"24_CR25","unstructured":"House of Representatives, Sarbanes-Oxley Act of 2002, 24 Jul 2002"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:22:49Z","timestamp":1606134169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_24","relation":{},"subject":[]}}