References
Basili, V.; Trendowicz, A.: Aligning Organisations through Measurement. The GQM+Strategies Approach. Wiesbaden, Springer Verlag, 2014
Common Criteria for Information Technology Security Evaluation, http://www.commoncriteriaportal.org/
Pretschner, A.: An Overview of Distributed Usage Control. Proc. of the 2nd Conf. Knowledge Engineering: Principles and Techniques. Cluj. (2009)
Usage Control, Fraunhofer IESE, http://s.fhg.de/UC
Hilty, M.; Pretschner, A.; Basin, D. A.; Schaefer, C.; Walter, T.: A Policy Language for Distributed Usage Control. Proceedings of the 12th Symposium on Research in Computer Security (pp. 531–546). Dresden, Germany: Springer Verlag (2007)
PRO-OPT, Big Data Produktionsoptimierung in Smart Ecosystems, BMBF-Förderprojekt, http://www.pro-opt.org/
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Jung, C., Kalmar, R. New Interpretation of Data Security Treasure Trove of Date and Business Models. ATZ Elektron Worldw 10, 14–19 (2015). https://doi.org/10.1007/s38314-015-0531-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s38314-015-0531-z