Skip to main content
Log in

Sicherheit von E-Business-Anwendungen — Struktur und Quantifizierung

  • WI - Schwerpunktaufsatz
  • Published:
Wirtschaftsinformatik

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Atkinson, R.: IP Authentication Header. RfC 1826, August 1995.

    Google Scholar 

  2. Atkinson, R.: IP Encapsulation Security Payload. RfC 1827, August 1995.

    Google Scholar 

  3. Bager, Jo; Bleich, Holger; Brauch, Patrick; Kossel, Axel: Natürliche Abwehrkräfte: Windows- und Internet-Software richtig konfigurieren. In: c’t, Feb. 2000, S. 214–223.

    Google Scholar 

  4. Bhargava, A.; Bhargava, B.: Measurement and quality of services in electronic commerce software. In: Proc. 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology, 1999.

    Google Scholar 

  5. Brocklehurst, S.; Littlewod, B.; Olovsson, T.; Jonsson, E.: On measurement of operational security. In: Proc. 9th Annual Conference on Computer Assurance, COMPASS’94, 1994.

    Google Scholar 

  6. Brocklehurst, S.; Littlewood, B.: New ways to get accurate reliability measures. In: IEEE Software, 1992.

    Google Scholar 

  7. British Standards Institute. BS7799: Code of Practice for Information Security Management (CoP), 1995.

    Google Scholar 

  8. Bundesamt für die Sicherheit in der Informationstechnik (BSI) IT-Grundschutzhandbuch: Maßnahmenempfehlungen für den mittleren Schutzbedarf. Bundesanzeigerverlag Bonn, 2000.

    Google Scholar 

  9. Cheswick, William R.; Bellovm, Steven M.: Firewalls and Internet Security — Repelling the Wily Hacker. Professional Computing Series. Addison-Wesley, Reading, Massachusetts, et al. 1997.

    Google Scholar 

  10. The Common Criteria Project. http://csrc.ncsl.nist.gov/cc, 2000-07-10, Abruf am 2000-07-14.

  11. Information Security Standards. http://www.diffuse.org/secure.html, 2000-04, Abruf am 2000-07-28.

  12. Damm, Daniela; Kirsch, Phillip; Schlieriger, Thomas; Teufel, Stephanie; Weidner, Harald; Zurfluh; Urs E.: Rapid Secure Development: Ein Verfahren zur Definition eines Internet-Sicherheitskonzeptes. Technischer Report, Institut für Informatik, Universität Zürich, 1999-02.

  13. Evaluated Products List. http://www.radium.ncsc.mil/tpep/epl/, 2000-05-09, Abruf am 2000-07-23

  14. Farmer, Dan: Gazing at Computer Security with 2020 Vision. http://www.fish.com/security/20-20-essay.html, Abruf am 2000-08-08.

  15. Farmer, Dan; Venema, Wietse: Improving the Security of Your Site by Breaking Into it. http://wzv.tue.nl/satan/admin-guide-to-cracking.html, 1993. Abruf am 1998-10-29. a][FIPS80]_Department of Commerce, National Bureau of Standards. Guidelines for Security of Computer Application, Federal Information Processing Standards Publication 73, June 1980.

    Google Scholar 

  16. Gaugler, Thomas: Interorganisatorische Informationssysteme (IOS): Ein Gestaltungsrahmen für das Informationsmanagment. Dissertation, Institut für Informatik, Universität Zürich, 2000.

    Google Scholar 

  17. Ghosh, A.K.: Securing E-Commerce: A Systematic Approach. In: Journal of Internet Banking and Commerce, 1997.

    Google Scholar 

  18. Iacohacci, Mauro: Automatische Additive Fabrikation — Verfahren, Prozesse, Wirtschaftlichkeit. Doktorandenseminar am Institut für Informatik der Universität Zürich, http://www.ifi.unizh.ch/~iacoba/pages.data/Komponenten/pdfs/doksemi4.pdf, Abruf am 2000-08-04.

  19. Institut für Grundlagenforschung in der Musik. http://www.ifi.unizh.ch/mml/musicmedia/ifm/ifm.html, Abruf am 2000-08-04.

  20. IBM: Retail Solution — Open all hours. http://www2.software.ibm.com/casestudies/swcs.nsf/customername/9EBF21ABF392E6EF00256745006E48D6, Abruf am 2000-08-07.

  21. Internet Security Systems. Network and Host-based Vulnerability Assessment, 1999. http://www.iss.net

    Google Scholar 

  22. The UK ITSec Scheme. http://www.itsec.gov.uk, Abruf am 2000-06-15

  23. Jøsang, Andrun: A subjective metric of authentication. In: Proc. of the 5th European Symposium on Research in Computer Security, LNCS 1485, pages 329–344, Belgium, Sep. 1998.

    Google Scholar 

  24. Knorr, Konstantin; Röhrig, Susanne: Security of Electronic Business Applications: Structure and Quantification. In: Proc. of the EC-Web 2000 Conference, pp.25–37, Sep. 2000, Greenwich, UK.

    Google Scholar 

  25. Kristol, D.; Montulli, L.: http State Management Mechanism, RFC 2107, 1997-02, http://info.internet.isi.edu/in-notes/rfc/files/rfc2109.txt, Abruf am 2000-07-04.

    Google Scholar 

  26. Maurer, Ueli: Modelling a public-key infrastructure. In: Proc. of the 5th European Symposium on Research in Computer Security, pp. 325–350, Italy, Sep.1996.

    Google Scholar 

  27. McCarthy, V.: Web-Security: How Much Is Enough? In: Datamation, January 1997.

    Google Scholar 

  28. Müller, Günter; Schoder, Detlef: Potentiale und Hürden des Electronic Commerce — Eine Momentaufnahme. In: Informatik Spektrum, August 1999.

    Google Scholar 

  29. Mutemajiri, Emerson: Security Requirements for Electronic Commerce, 1999-05-10, http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/emutemaj/, Abruf am 2000-07-31.

    Google Scholar 

  30. Nabil, Adam R.; Yesha, Yelena (Eds.): Electronic Commerce: Current Research Issues and Applications. LNCS 1028, Springer, Heidelberg et al. 1996.

    Google Scholar 

  31. Noser, Hansrudi: Net.commerce Framework für eCommerce. Vortrag im Rahmen des Fortbildungsseminars „Electronic Business — Potentiale, Rahmenbedingungen und Anwendungsfelder”, Institut für Informatik, Universität Zürich, 1999-09-22.

    Google Scholar 

  32. Noser, Hansrudi; Stucki, Peter: Dynamic 3D Visualization of Database-Defined Tree Structures on the WWW by Using Rewriting Systems. In: Proc. WECWIS 2000 Workshop (Second International Workshop on Advanced Issues of E/Commerce and Web-based Information Systems), pp. 247–254, Milpitas (CA), 2000-06-08.

    Chapter  Google Scholar 

  33. Oppliger, Rolf: Internet Security: Firewalls and Beyond. In: Communications of the ACM 40 (1997) 5.

    Google Scholar 

  34. Pfifzmann, Andreas; Wolf Gutta: Empowering Users to Set Their Protection Goals. In: Müller, Günter; Rannenberg, Kai: Multilateral Security in Communications. Addison-Wesley, München 1999.

    Google Scholar 

  35. Pfleeger, Charles P.: Security in Computing. Prentice Hall, Upper Saddle River, NJ 1997.

    Google Scholar 

  36. Schönberg, Arndt; Thoben, Wilfried: Ein unscharfes Bewertungskonzept für die Bedrohungs- und Risikoanalyse Workflow-basierter Anwendungen. In: Sicherheit und Electronic Commerce — Konzepte, Modelle und technische Möglichkeiten (WS SEC’98), Röhm, A.; Fox, D.; Grimm, R, Schoder. D. (Hrsg.), S. 47–62, Essen, Vieweg-Verlag, Wiesbaden 1998.

    Google Scholar 

  37. SEMPER Consortium/ IBM & Uni Saarbrücken (Eds.): SEMPER: Secure Electronic Marketplace for Europe; Volume 1854 in the Lecture Notes in Computer Science (LNCS) Series. Springer-Verlag, Heidelberg 2000.

    Google Scholar 

  38. SET Secure Electronic Transaction Specification, Book 1: Business Description, Version 1.0, 31-05-1997. http://www.setco.org, Abruf am 2000-07-30.

  39. Stucki, Peter; Mazzola, Guerino; Noser, Hansrudi: Rewriting Processes and Denotator Spaces for Interactive Audio Visual Navigation on Music and Sound Knowledge Bases on the Web, Bewilligtes Forschungsgesuch des Schweizerischen Nationalfonds, Nr. 2100-059471.

  40. Ting, T.C.: How secure is secure: Some thoughts on security metrics. In: Proc. of the 9th annual IFIP WG 11.3 Working Conference on Database Security, pp. 3–7, Lake Tahoe, CA, Aug. 1995.

    Google Scholar 

  41. Wang, Chenxi; Wulf William A.: Towards a Framework for Security Measurement. In: Proc. of the 1997 National Information Systems Security Conference, pp. 522–533, Baltimore, Maryland, October 1997.

    Google Scholar 

  42. Zwass, Vladimir: Electronic Commerce: Structures and Issues. International Journal of Electronic Commerce, 1(1):3–23, 1996. http://www.cba.bgsu.edu/ijec, Abruf am 2000-07-22.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susanne Röhrig.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Röhrig, S., Knorr, K. & Noser, H. Sicherheit von E-Business-Anwendungen — Struktur und Quantifizierung. Wirtschaftsinf 42, 499–507 (2000). https://doi.org/10.1007/BF03250766

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03250766

Navigation