![]() | ![]() |
2008 | ||
---|---|---|
4 | EE | Mariana Gerber, Rossouw von Solms: Information security requirements - Interpreting the legal aspects. Computers & Security 27(5-6): 124-135 (2008) |
2005 | ||
3 | EE | Mariana Gerber, Rossouw von Solms: Management of risk in the information age. Computers & Security 24(1): 16-30 (2005) |
2001 | ||
2 | Mariana Gerber, Rossouw von Solms: From Risk Analysis to Security Requirements. Computers & Security 20(7): 577-584 (2001) | |
1 | EE | Mariana Gerber, Rossouw von Solms, Paul L. Overbeek: Formalizing information security requirements. Inf. Manag. Comput. Security 9(1): 32-37 (2001) |
1 | Paul L. Overbeek | [1] |
2 | Rossouw von Solms | [1] [2] [3] [4] |