Author:
Bellamy R. K. E.,Erickson T.,Fuller B.,Kellogg W. A.,Rosenbaum R.,Thomas J. C.,Vetting Wolf T.
Subject
Computational Theory and Mathematics,Computer Graphics and Computer-Aided Design,Information Systems,General Computer Science,Theoretical Computer Science,Software
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Regulatory Compliance Modelling Using Risk Management Techniques;2021 IEEE World AI IoT Congress (AIIoT);2021-05-10
2. Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment;Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications;2021
3. Modelling Compliance Threats and Security Analysis of Cross Border Health Data Exchange;Communications in Computer and Information Science;2019
4. BPM Supported Privacy by Design for Cross-Organization Business Processes;Service-Oriented Computing - ICSOC 2014 Workshops;2015
5. Aiding Compliance Governance in Service-Based Business Processes;Handbook of Research on Service-Oriented Systems and Non-Functional Properties;2012