Author of the publication

An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF.

, , , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Risk-Based Security Analysis with /*., , and . Social Modeling for Requirements Engineering, MIT Press, (2011)Towards a Process Assessment Model for Management System Standards., , , and . SPICE, volume 477 of Communications in Computer and Information Science, page 36-47. Springer, (2014)Requirements Engineering for Improving Business/IT Alignment in Security Risk Management Methods., , and . IESA, page 15-26. Springer, (2007)The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector., , , , and . ERCIM News, (2016)An integrated conceptual model for information system security risk management supported by enterprise architecture management., , , , , and . Softw. Syst. Model., 18 (3): 2285-2312 (2019)Evaluation of the Cognitive Effectiveness of the CORAS Modelling Language., , and . ER Workshops, volume 11158 of Lecture Notes in Computer Science, page 149-162. Springer, (2018)Model-based Management of Information System Security Risk.. Université de Namur, Belgium, (2009)An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF., , , and . PoEM, volume 267 of Lecture Notes in Business Information Processing, page 353-361. Springer, (2016)An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance)., , , and . EuroSPI, volume 543 of Communications in Computer and Information Science, page 87-99. Springer, (2015)Systemic Security Risks in the Telecommunications Sector: An Approach for Security and Integrity of Networks and Services., and . COMPLEXIS, page 72-79. SCITEPRESS, (2020)