Literatur
Atkinson, R.: IP Authentication Header. RfC 1826, August 1995.
Atkinson, R.: IP Encapsulation Security Payload. RfC 1827, August 1995.
Bager, Jo; Bleich, Holger; Brauch, Patrick; Kossel, Axel: Natürliche Abwehrkräfte: Windows- und Internet-Software richtig konfigurieren. In: c’t, Feb. 2000, S. 214–223.
Bhargava, A.; Bhargava, B.: Measurement and quality of services in electronic commerce software. In: Proc. 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology, 1999.
Brocklehurst, S.; Littlewod, B.; Olovsson, T.; Jonsson, E.: On measurement of operational security. In: Proc. 9th Annual Conference on Computer Assurance, COMPASS’94, 1994.
Brocklehurst, S.; Littlewood, B.: New ways to get accurate reliability measures. In: IEEE Software, 1992.
British Standards Institute. BS7799: Code of Practice for Information Security Management (CoP), 1995.
Bundesamt für die Sicherheit in der Informationstechnik (BSI) IT-Grundschutzhandbuch: Maßnahmenempfehlungen für den mittleren Schutzbedarf. Bundesanzeigerverlag Bonn, 2000.
Cheswick, William R.; Bellovm, Steven M.: Firewalls and Internet Security — Repelling the Wily Hacker. Professional Computing Series. Addison-Wesley, Reading, Massachusetts, et al. 1997.
The Common Criteria Project. http://csrc.ncsl.nist.gov/cc, 2000-07-10, Abruf am 2000-07-14.
Information Security Standards. http://www.diffuse.org/secure.html, 2000-04, Abruf am 2000-07-28.
Damm, Daniela; Kirsch, Phillip; Schlieriger, Thomas; Teufel, Stephanie; Weidner, Harald; Zurfluh; Urs E.: Rapid Secure Development: Ein Verfahren zur Definition eines Internet-Sicherheitskonzeptes. Technischer Report, Institut für Informatik, Universität Zürich, 1999-02.
Evaluated Products List. http://www.radium.ncsc.mil/tpep/epl/, 2000-05-09, Abruf am 2000-07-23
Farmer, Dan: Gazing at Computer Security with 2020 Vision. http://www.fish.com/security/20-20-essay.html, Abruf am 2000-08-08.
Farmer, Dan; Venema, Wietse: Improving the Security of Your Site by Breaking Into it. http://wzv.tue.nl/satan/admin-guide-to-cracking.html, 1993. Abruf am 1998-10-29. a][FIPS80]_Department of Commerce, National Bureau of Standards. Guidelines for Security of Computer Application, Federal Information Processing Standards Publication 73, June 1980.
Gaugler, Thomas: Interorganisatorische Informationssysteme (IOS): Ein Gestaltungsrahmen für das Informationsmanagment. Dissertation, Institut für Informatik, Universität Zürich, 2000.
Ghosh, A.K.: Securing E-Commerce: A Systematic Approach. In: Journal of Internet Banking and Commerce, 1997.
Iacohacci, Mauro: Automatische Additive Fabrikation — Verfahren, Prozesse, Wirtschaftlichkeit. Doktorandenseminar am Institut für Informatik der Universität Zürich, http://www.ifi.unizh.ch/~iacoba/pages.data/Komponenten/pdfs/doksemi4.pdf, Abruf am 2000-08-04.
Institut für Grundlagenforschung in der Musik. http://www.ifi.unizh.ch/mml/musicmedia/ifm/ifm.html, Abruf am 2000-08-04.
IBM: Retail Solution — Open all hours. http://www2.software.ibm.com/casestudies/swcs.nsf/customername/9EBF21ABF392E6EF00256745006E48D6, Abruf am 2000-08-07.
Internet Security Systems. Network and Host-based Vulnerability Assessment, 1999. http://www.iss.net
The UK ITSec Scheme. http://www.itsec.gov.uk, Abruf am 2000-06-15
Jøsang, Andrun: A subjective metric of authentication. In: Proc. of the 5th European Symposium on Research in Computer Security, LNCS 1485, pages 329–344, Belgium, Sep. 1998.
Knorr, Konstantin; Röhrig, Susanne: Security of Electronic Business Applications: Structure and Quantification. In: Proc. of the EC-Web 2000 Conference, pp.25–37, Sep. 2000, Greenwich, UK.
Kristol, D.; Montulli, L.: http State Management Mechanism, RFC 2107, 1997-02, http://info.internet.isi.edu/in-notes/rfc/files/rfc2109.txt, Abruf am 2000-07-04.
Maurer, Ueli: Modelling a public-key infrastructure. In: Proc. of the 5th European Symposium on Research in Computer Security, pp. 325–350, Italy, Sep.1996.
McCarthy, V.: Web-Security: How Much Is Enough? In: Datamation, January 1997.
Müller, Günter; Schoder, Detlef: Potentiale und Hürden des Electronic Commerce — Eine Momentaufnahme. In: Informatik Spektrum, August 1999.
Mutemajiri, Emerson: Security Requirements for Electronic Commerce, 1999-05-10, http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/emutemaj/, Abruf am 2000-07-31.
Nabil, Adam R.; Yesha, Yelena (Eds.): Electronic Commerce: Current Research Issues and Applications. LNCS 1028, Springer, Heidelberg et al. 1996.
Noser, Hansrudi: Net.commerce Framework für eCommerce. Vortrag im Rahmen des Fortbildungsseminars „Electronic Business — Potentiale, Rahmenbedingungen und Anwendungsfelder”, Institut für Informatik, Universität Zürich, 1999-09-22.
Noser, Hansrudi; Stucki, Peter: Dynamic 3D Visualization of Database-Defined Tree Structures on the WWW by Using Rewriting Systems. In: Proc. WECWIS 2000 Workshop (Second International Workshop on Advanced Issues of E/Commerce and Web-based Information Systems), pp. 247–254, Milpitas (CA), 2000-06-08.
Oppliger, Rolf: Internet Security: Firewalls and Beyond. In: Communications of the ACM 40 (1997) 5.
Pfifzmann, Andreas; Wolf Gutta: Empowering Users to Set Their Protection Goals. In: Müller, Günter; Rannenberg, Kai: Multilateral Security in Communications. Addison-Wesley, München 1999.
Pfleeger, Charles P.: Security in Computing. Prentice Hall, Upper Saddle River, NJ 1997.
Schönberg, Arndt; Thoben, Wilfried: Ein unscharfes Bewertungskonzept für die Bedrohungs- und Risikoanalyse Workflow-basierter Anwendungen. In: Sicherheit und Electronic Commerce — Konzepte, Modelle und technische Möglichkeiten (WS SEC’98), Röhm, A.; Fox, D.; Grimm, R, Schoder. D. (Hrsg.), S. 47–62, Essen, Vieweg-Verlag, Wiesbaden 1998.
SEMPER Consortium/ IBM & Uni Saarbrücken (Eds.): SEMPER: Secure Electronic Marketplace for Europe; Volume 1854 in the Lecture Notes in Computer Science (LNCS) Series. Springer-Verlag, Heidelberg 2000.
SET Secure Electronic Transaction Specification, Book 1: Business Description, Version 1.0, 31-05-1997. http://www.setco.org, Abruf am 2000-07-30.
Stucki, Peter; Mazzola, Guerino; Noser, Hansrudi: Rewriting Processes and Denotator Spaces for Interactive Audio Visual Navigation on Music and Sound Knowledge Bases on the Web, Bewilligtes Forschungsgesuch des Schweizerischen Nationalfonds, Nr. 2100-059471.
Ting, T.C.: How secure is secure: Some thoughts on security metrics. In: Proc. of the 9th annual IFIP WG 11.3 Working Conference on Database Security, pp. 3–7, Lake Tahoe, CA, Aug. 1995.
Wang, Chenxi; Wulf William A.: Towards a Framework for Security Measurement. In: Proc. of the 1997 National Information Systems Security Conference, pp. 522–533, Baltimore, Maryland, October 1997.
Zwass, Vladimir: Electronic Commerce: Structures and Issues. International Journal of Electronic Commerce, 1(1):3–23, 1996. http://www.cba.bgsu.edu/ijec, Abruf am 2000-07-22.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Röhrig, S., Knorr, K. & Noser, H. Sicherheit von E-Business-Anwendungen — Struktur und Quantifizierung. Wirtschaftsinf 42, 499–507 (2000). https://doi.org/10.1007/BF03250766
Issue Date:
DOI: https://doi.org/10.1007/BF03250766