Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 richter2013holistic
%A Richter, P.
%A Simić-Draws, D.
%A Neumann, S.
%A Kahlert, A.
%A Grimm, R.
%A Volkamer, M.
%A Roßnagel, A.
%D 2013
%E 27001/IT-Grundschutz, ISO
%E KORA,
%J International Journal of Information Security and Privacy (IJISP)
%K itegpub
%P 16-35
%T Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria
@article{richter2013holistic,
added-at = {2013-12-01T14:02:14.000+0100},
author = {Richter, P. and Simić-Draws, D. and Neumann, S. and Kahlert, A. and Grimm, R. and Volkamer, M. and Roßnagel, A.},
biburl = {https://www.bibsonomy.org/bibtex/2a7075fb47b7591e07f2bf8dda46a2a91/provet-hiwi},
editor = {27001/IT-Grundschutz, ISO and KORA},
interhash = {35cf801e6282b99ba65b56737e895f81},
intrahash = {a7075fb47b7591e07f2bf8dda46a2a91},
journal = {International Journal of Information Security and Privacy (IJISP)},
keywords = {itegpub},
pages = {16-35},
timestamp = {2013-12-01T14:02:14.000+0100},
title = {Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria},
year = 2013
}