Business process-based valuation of IT-security. Neubauer, T., Klemen, M. D., & Biffl, S. ACM SIGSOFT Software Engineering Notes (SIGSOFT), 30(4):1-5, 2005.
Paper bibtex @article{ dblp2720865,
title = {Business process-based valuation of IT-security},
author = {Thomas Neubauer and Markus D. Klemen and Stefan Biffl},
author_short = {Neubauer, T. and Klemen, M. D. and Biffl, S.},
bibtype = {article},
type = {article},
year = {2005},
key = {dblp2720865},
id = {dblp2720865},
biburl = {http://www.dblp.org/rec/bibtex/journals/sigsoft/NeubauerKB05},
url = {http://doi.acm.org/10.1145/1082983.1083099},
journal = {ACM SIGSOFT Software Engineering Notes (SIGSOFT)},
pages = {1-5},
number = {4},
volume = {30},
text = {ACM SIGSOFT Software Engineering Notes (SIGSOFT) 30(4):1-5 (2005)}
}
Downloads: 0
{"_id":{"_str":"525be9467e98fada740001de"},"__v":0,"authorIDs":[],"author_short":["Neubauer, T.","Klemen, M. D.","Biffl, S."],"bibbaseid":"neubauer-klemen-biffl-businessprocessbasedvaluationofitsecurity-2005","bibdata":{"html":"<div class=\"bibbase_paper\">\n\n\n<span class=\"bibbase_paper_titleauthoryear\">\n\t<span class=\"bibbase_paper_title\"><a name=\"dblp2720865\"> </a>Business process-based valuation of IT-security.</span>\n\t<span class=\"bibbase_paper_author\">\nNeubauer, T.; Klemen, M. D.; and Biffl, S.</span>\n\t<!-- <span class=\"bibbase_paper_year\">2005</span>. -->\n</span>\n\n\n\n<i>ACM SIGSOFT Software Engineering Notes (SIGSOFT)</i>,\n\n30(4):1-5.\n\n 2005.\n\n\n\n\n<br class=\"bibbase_paper_content\"/>\n\n<span class=\"bibbase_paper_content\">\n \n \n <!-- <i -->\n <!-- onclick=\"javascript:log_download('neubauer-klemen-biffl-businessprocessbasedvaluationofitsecurity-2005', 'http://doi.acm.org/10.1145/1082983.1083099')\">DEBUG -->\n <!-- </i> -->\n\n <a href=\"http://doi.acm.org/10.1145/1082983.1083099\"\n onclick=\"javascript:log_download('neubauer-klemen-biffl-businessprocessbasedvaluationofitsecurity-2005', 'http://doi.acm.org/10.1145/1082983.1083099')\">\n <img src=\"http://bibbase.org/img/filetypes/blank.png\"\n\t alt=\"Business process-based valuation of IT-security [.1083099]\" \n\t class=\"bibbase_icon\"\n\t style=\"width: 24px; height: 24px; border: 0px; vertical-align: text-top\" ><span class=\"bibbase_icon_text\">Paper</span></a> \n \n \n <a href=\"javascript:showBib('dblp2720865')\">\n <img src=\"http://bibbase.org/img/filetypes/bib.png\" \n\t alt=\"Business process-based valuation of IT-security [bib]\" \n\t class=\"bibbase_icon\"\n\t style=\"width: 24px; height: 24px; border: 0px; vertical-align: text-top\"><span class=\"bibbase_icon_text\">Bibtex</span></a>\n \n \n\n \n \n \n \n \n\n \n \n</span>\n\n<!-- -->\n\n</div>\n","downloads":0,"bibbaseid":"neubauer-klemen-biffl-businessprocessbasedvaluationofitsecurity-2005","urls":{"Paper":"http://doi.acm.org/10.1145/1082983.1083099"},"role":"author","bibtex":"@article{ dblp2720865,\n title = {Business process-based valuation of IT-security},\n author = {Thomas Neubauer and Markus D. Klemen and Stefan Biffl},\n author_short = {Neubauer, T. and Klemen, M. D. and Biffl, S.},\n bibtype = {article},\n type = {article},\n year = {2005},\n key = {dblp2720865},\n id = {dblp2720865},\n biburl = {http://www.dblp.org/rec/bibtex/journals/sigsoft/NeubauerKB05},\n url = {http://doi.acm.org/10.1145/1082983.1083099},\n journal = {ACM SIGSOFT Software Engineering Notes (SIGSOFT)},\n pages = {1-5},\n number = {4},\n volume = {30},\n text = {ACM SIGSOFT Software Engineering Notes (SIGSOFT) 30(4):1-5 (2005)}\n}","text":"ACM SIGSOFT Software Engineering Notes (SIGSOFT) 30(4):1-5 (2005)","volume":"30","number":"4","pages":"1-5","journal":"ACM SIGSOFT Software Engineering Notes (SIGSOFT)","url":"http://doi.acm.org/10.1145/1082983.1083099","biburl":"http://www.dblp.org/rec/bibtex/journals/sigsoft/NeubauerKB05","id":"dblp2720865","key":"dblp2720865","year":"2005","type":"article","bibtype":"article","author_short":["Neubauer, T.","Klemen, M. D.","Biffl, S."],"author":["Thomas Neubauer","Markus D. Klemen","Stefan Biffl"],"title":"Business process-based valuation of IT-security"},"bibtype":"article","biburl":"http://www.dblp.org/rec/bibtex/journals/sigsoft/NeubauerKB05","downloads":0,"search_terms":["business","process","based","valuation","security","neubauer","klemen","biffl"],"title":"Business process-based valuation of IT-security","year":2005,"dataSources":["SNCw6zaYaJBeopJuA"]}