Formalization of security patterns as a means to infer security controls in business processes

Logic Journal of the IGPL 23 (1):57-72 (2015)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,122

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Social Risks and Demands for Security.Maria Laura Lanzillo - 2015 - Governare la Paura. Journal of Interdisciplinary Studies 8 (1).
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.

Analytics

Added to PP
2016-06-30

Downloads
8 (#1,189,951)

6 months
1 (#1,241,711)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references