Author of the publication

An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF.

, , , and . PoEM, volume 267 of Lecture Notes in Business Information Processing, page 353-361. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Risk Integration Framework for the Service-Oriented Enterprise., , and . Int. J. Inf. Syst. Serv. Sect., 10 (3): 1-19 (2018)An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF., , , and . PoEM, volume 267 of Lecture Notes in Business Information Processing, page 353-361. Springer, (2016)Towards Systemic Risk Management in the Frame of Business Service Ecosystem., , and . CAiSE Workshops, volume 215 of Lecture Notes in Business Information Processing, page 27-39. Springer, (2015)Conceptual Integration of Enterprise Architecture Management and Security Risk Management., , and . EDOC Workshops, page 114-123. IEEE Computer Society, (2013)Participative Design of a Security Risk Reference Model: an Experience in the Healthcare Sector., , , , and . PoEM (Short Papers), volume 1497 of CEUR Workshop Proceedings, page 1-10. CEUR-WS.org, (2015)Managing the Alignment between Business and Software Services Requirements from a Capability Model Perspective., , , and . ServiceWave, volume 5377 of Lecture Notes in Computer Science, page 171-182. Springer, (2008)Model-driven Approach for Privacy Management in Business Ecosystem., , , and . MODELSWARD, page 392-400. SciTePress, (2017)Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case., , , , and . PoEM, volume 369 of Lecture Notes in Business Information Processing, page 226-241. Springer, (2019)Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation., , , and . EuroSPI, volume 364 of Communications in Computer and Information Science, page 13-24. Springer, (2013)Managing Regulatory System with Megamodelling., , and . CBI (2), page 1-10. IEEE Computer Society, (2018)978-1-5386-7016-3.