%==============================================================================
% Papers, URLs, and Books 
%==============================================================================





% http://www.literatur-generator.de/


@unpublished{itilwik,
   author = "Wikipedia.de",   
   note = "[accessed: August 30. 2012]", 
   title = "IT Infrastructure Library",
   year = "2012",
   URL = "http://de.wikipedia.org/wiki/IT_Infrastructure_Library"
}



@unpublished{what-is-iso,
   author = "Wikipedia.de",   
   note = "[accessed: August 29. 2012]", 
   title = "Internationale Organisation für Normung",
   year = "2012",
   URL = "http://de.wikipedia.org/wiki/Internationale_Organisation_f%C3%BCr_Normung"
}


@misc{iso27001,
   Key = {{ISO/IEC 27001:2005}},
   publisher = {{ISO, Geneva, Switzerland}},
   type = {{Norm}},
   title = {{ISO/IEC 27001:2005 Information technology -- Security techniques -- Information security management systems -- Requirements}},
   number = {{ISO/IEC 27001:2005}},
   year = 2005,
}


@misc{iso27002,
   Key = {{ISO/IEC 27002:2005}},
   publisher = {{ISO, Geneva, Switzerland}},
   type = {{Norm}},
   title = {{ISO/IEC 27002:2005 Information technology -- Security techniques -- Code of practice for information security management}},
   number = {{ISO/IEC 27002:2005}},
   year = 2005,
}


@unpublished{oesiha, 
   author = "A-SIT",   
   note = "[accessed: August 16. 2012], A-SIT: Zentrum für sichere Informationstechnologie - Austria", 
   title = "Das österreichische Informationssicherheitshandbuch",
   year = "2010",
   URL = "https://www.sicherheitshandbuch.gv.at/dojo/downloads/sicherheitshandbuch.pdf"
}




@unpublished{gs-leitfaden,
   author = {{Bundesamt für Sicherheit in der Informationstechnik - BSI}},   
   note = "[accessed: August 26. 2012], BSI-Artikelnummer: BSI-Bro12/311", 
   title = "Leitfaden für Informationssicherheit",
   year = "2012",
   URL = "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Leitfaden/GS-Leitfaden_pdf.pdf?__blob=publicationFile"
}




@unpublished{gs-vorgehensweise,
   author = {{Bundesamt für Sicherheit in der Informationstechnik - BSI}},   
   note = "[accessed: August 29. 2012]", 
   title = "BSI-Standard 100-2 IT-Grundschutz-Vorgehensweise",
   year = "2008",
   URL = {{https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/ITGrundschutzstandards/standard_1002_pdf.pdf;jsessionid=E6B55EF3FC432A55C45E095973014389.2_cid294?__blob=publicationFile}}
}







%Bejiing
@INPROCEEDINGS{5704127, 
author={Qian Wang and Junde Song and Lianru Liu and Xiaoxiang Luo and XinHua, E.}, 
booktitle={Pervasive Computing and Applications (ICPCA), 2010 5th International Conference on}, title={Building IT-based incident management platform}, 
year={2010}, 
month={dec.}, 
volume={}, 
number={}, 
pages={359 -364}, 
keywords={IT services;customer service support;incident management;lTIL;service desks;customer services;information management;information technology;}, 
doi={10.1109/ICPCA.2010.5704127}, 
ISSN={},}




%St. Gallen
@INPROCEEDINGS{1402383, 
author={Hochstein, A. and Zarnekow, R. and Brenner, W.}, 
booktitle={e-Technology, e-Commerce and e-Service, 2005. EEE '05. Proceedings. The 2005 IEEE International Conference on}, title={ITIL as common practice reference model for IT service management: formal assessment and implications for practice}, 
year={2005}, 
month={march-1 april}, 
volume={}, 
number={}, 
pages={ 704 - 710}, 
abstract={ Due to enhanced focus on the customer in the planning, development and delivery of information services, IT service management has become increasingly important. These days IT management is focussing particularly on the de facto standard ITIL (IT Infrastructure Library) for implementing IT service management. In doing this, deficits of the ITIL reference model are often being overlooked, the benefits are merely assumed and misunderstandings spread. This results in uncertainties, unfulfilled expectations and problems in the execution of ITIL transformation projects. Against this background the article critically assesses the ITIL reference model. A formal analysis of the model on the basis of established criteria according to the principles for proper modelling is undertaken and implications for IT management are deduced from this. Four case studies of ITIL transformation projects conducted for this purpose, as well as an analysis of the ITIL documents, serve as basis for the assessment.}, 
keywords={ IT infrastructure library; IT service management; ITIL document analysis; ITIL reference model; formal assessment; information services; document handling; information services; information technology; libraries;}, 
doi={10.1109/EEE.2005.86}, 
ISSN={},}




%TODO



% This paper reference has been downloaded from the ACM digital library
@inproceedings{Wick2005,
 author = {Wick, Michael and Stevenson, Daniel and Wagner, Paul},
 title = {Using testing and JUnit across the curriculum},
 booktitle = {Proceedings of the 36th SIGCSE technical symposium on Computer science education},
 series = {SIGCSE '05},
 year = {2005},
 isbn = {1-58113-997-7},
 location = {St. Louis, Missouri, USA},
 pages = {236--240},
 numpages = {5},
 acmid = {1047427},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {JUnit, testing, unit testing, unit testing frameworks},
} 


% How to define a URL reference
@unpublished{dpquiz,
   author = "Vince Huston",   
   note = "[accessed: August 3. 2011]",
   title = "Huston Design Patterns",
   year = "2011",
   URL = "http://www.vincehuston.org/dp/"
}


% How to deefine book references
@Book{Gamma95,
  author =       "Erich Gamma and Richard Helm and Ralph Johnson and
                 John Vlissides",
  title =        "Design Patterns",
  publisher =    "Addison Wesly",
  address =      "Reading, MA",
  year =         "1995",
  keywords =     "olit-oose design-patterns reuse book scglib sclit",
  ISBN =         "0-201-63361-2-(3)",
}


@Book{Marinescu02,
  author =       "Floyd Marinescu",
  title =        "EJB Design Patterns: Advanced Patterns, Processes and Idioms",
  publisher =    "Wiley Computer Publishing",
  year =         "2002",
}


@Book{POSA1,
  author =       "Frank Buschmann and Regine Meunier and Hans Rohnert and Peter Sommerlad and Michael Stal",
  title =        "Pattern--Oriented Software Architecture: A System of Patterns",
  publisher =    "John Wiley \& Sons",
  year =         "1996",
  ISBN =         "0 471 95869 7",
}

@Book{POSA2,
  author =       "Douglas Schmidt and Michael Stal and Hans Rohnert and Frank Buschmann",
  title =        "Pattern--Oriented Software Architecture Volume 2: Patterns for Concurrent and Networked Objects",
  publisher =    "John Wiley \& Sons",
  year =         "2000",
  ISBN =         "0 471 60695 2",
}

@Book{ServerComponentPatterns02,
  author =       "Markus Volter and Alexander Schmid and Eberhard Wolff",
  title =        "Server Component Patterns, Component Infrastructures Illustrated with EJB",
  publisher =    "John Wiley \& Sons",
  year =         "2002",
  ISBN =         "0 470 84319 5",
}

@Book{PatternsOfEnterpriseApplicationArchitecture03,
  author =       "Martin Fowler",
  title =        "Patterns of Enterprise Application Architecture",
  publisher =    "Addison Wesly",
  address =      " ",
  year =         "2003",
  keywords =     " ",
  ISBN =         "0 321 12742 0",
}


@Book{J2EECorePatterns,
  author =       "Deepak Alur and John Crupi and Dan Malks",
  title =        "Core J2EE Patterns. Best Practice and Design Strategies, Second Edition",
  publisher =    "Prentice Hall",
  year =         "2003",
  ISBN =         "0 13 142246 4",
}

