Author of the publication

Défis de la sécurité de l'information. Support à la gestion des risques de sécurité par les modèles.

, , , and . Ingénierie des Systèmes d'Information, 13 (1): 37-74 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach., , , and . EDOC, page 81-90. IEEE Computer Society, (2013)Design of a Modelling Language for Information System Security Risk Management., , and . RCIS, page 121-132. (2007)Towards a Process Assessment Model for Management System Standards., , , and . SPICE, volume 477 of Communications in Computer and Information Science, page 36-47. Springer, (2014)An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF., , , and . PoEM, volume 267 of Lecture Notes in Business Information Processing, page 353-361. Springer, (2016)An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF., , , , and . CoRR, (2017)An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance)., , , and . EuroSPI, volume 543 of Communications in Computer and Information Science, page 87-99. Springer, (2015)Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development., , , , , and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 541-555. Springer, (2008)Towards a Measurement Framework for Security Risk Management., , , and . MODSEC@MoDELS, volume 413 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)A general approach for a trusted deployment of a business process in clouds., , and . MEDES, page 92-99. ACM, (2013)Défis de la sécurité de l'information. Support à la gestion des risques de sécurité par les modèles., , , and . Ingénierie des Systèmes d'Information, 13 (1): 37-74 (2008)