Skip to main content
Log in

New Interpretation of Data Security Treasure Trove of Date and Business Models

  • Development
  • IT
  • Published:
ATZelektronik worldwide Aims and scope

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

FIGURE 1
FIGURE 2
FIGURE 3

References

  1. Basili, V.; Trendowicz, A.: Aligning Organisations through Measurement. The GQM+Strategies Approach. Wiesbaden, Springer Verlag, 2014

    Google Scholar 

  2. Common Criteria for Information Technology Security Evaluation, http://www.commoncriteriaportal.org/

  3. Pretschner, A.: An Overview of Distributed Usage Control. Proc. of the 2nd Conf. Knowledge Engineering: Principles and Techniques. Cluj. (2009)

    Google Scholar 

  4. Usage Control, Fraunhofer IESE, http://s.fhg.de/UC

  5. Hilty, M.; Pretschner, A.; Basin, D. A.; Schaefer, C.; Walter, T.: A Policy Language for Distributed Usage Control. Proceedings of the 12th Symposium on Research in Computer Security (pp. 531–546). Dresden, Germany: Springer Verlag (2007)

    Google Scholar 

  6. PRO-OPT, Big Data Produktionsoptimierung in Smart Ecosystems, BMBF-Förderprojekt, http://www.pro-opt.org/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jung, C., Kalmar, R. New Interpretation of Data Security Treasure Trove of Date and Business Models. ATZ Elektron Worldw 10, 14–19 (2015). https://doi.org/10.1007/s38314-015-0531-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s38314-015-0531-z

Keywords

Navigation