-
1
-
-
0346946549
-
Critical connections: Communications for the future
-
Office of Technology Assessment
-
Critical connections: communications for the future. OTA-CIT-407, OTA-U.S. Congress, Office of Technology Assessment, 1990.
-
(1990)
OTA-CIT-407, OTA-U.S. Congress
-
-
-
2
-
-
0346946586
-
-
Nederlands Genootschap voor Informatici/Kluwer, Deventer, (in Dutch)
-
Informatiebeveiliging: state of the art. Nederlands Genootschap voor Informatici/Kluwer, Deventer, 1993 (in Dutch).
-
(1993)
Informatiebeveiliging: State of the Art
-
-
-
3
-
-
0009708727
-
Integrating security activities into the software development lifecycle and the software Quality assurance process
-
F. G. Tompkins and R. Rice, Integrating security activities into the software development lifecycle and the software Quality assurance process, Computers & Security, 5 (1986) 218-242.
-
(1986)
Computers & Security
, vol.5
, pp. 218-242
-
-
Tompkins, F.G.1
Rice, R.2
-
4
-
-
0346946551
-
Developing policies, procedures and information security systems
-
eds J. H. P. Eloff and S. H. von Solms. Chapman & Hall, London
-
Warman, A. R., Developing policies, procedures and information security systems. In Information Security - The Next Decade: Proceedings of IFIP Information Security 1995, eds J. H. P. Eloff and S. H. von Solms. Chapman & Hall, London, 1995, pp. 465-476.
-
(1995)
Information Security - The next Decade: Proceedings of IFIP Information Security 1995
, pp. 465-476
-
-
Warman, A.R.1
-
5
-
-
0348207213
-
-
Samsom BedrijfsInformatie, Alphen a/d Rijn/Zaventem, (in Dutch)
-
Breed, N. F., Out, D. J. and Tettero, O., Informatiebeveiliging, een blik achter de schermen. Samsom BedrijfsInformatie, Alphen a/d Rijn/Zaventem, 1995 (in Dutch).
-
(1995)
Informatiebeveiliging, een Blik Achter de Schermen
-
-
Breed, N.F.1
Out, D.J.2
Tettero, O.3
-
6
-
-
0028484728
-
Security architecture for ODP systems, final results of the CEC COST-11 Ter "Security" project
-
S. Muftic, Security architecture for ODP systems, final results of the CEC COST-11 Ter "Security" project, Computer Networks and ISDN Systems, 26 (1994) 1343-1349.
-
(1994)
Computer Networks and ISDN Systems
, vol.26
, pp. 1343-1349
-
-
Muftic, S.1
-
7
-
-
0009687432
-
A methodology for the development of secure application systems
-
eds J. H. P. Eloff and S. H. von Solms. Chapman & Hall, London
-
Booysen, H. A. S. and Eloff, J. H. P., A methodology for the development of secure application systems. In Information Security - The Next Decade: Proceedings of IFIP Information Security, eds J. H. P. Eloff and S. H. von Solms. Chapman & Hall, London, 1995, pp. 255-269.
-
(1995)
Information Security - The next Decade: Proceedings of IFIP Information Security
, pp. 255-269
-
-
Booysen, H.A.S.1
Eloff, J.H.P.2
-
8
-
-
0028757699
-
A methodology to include computer security, safety and resilience requirements as part of the user requirement
-
D. N. J. Mostert and S. H. von Solms, A methodology to include computer security, safety and resilience requirements as part of the user requirement, Computers & Security, 13(4) (1994) 349-364.
-
(1994)
Computers & Security
, vol.13
, Issue.4
, pp. 349-364
-
-
Mostert, D.N.J.1
Von Solms, S.H.2
-
9
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Mitre Corporation, Bedford, MA
-
Bell, D. E. and LaPadula, L. J., Secure computer systems: unified exposition and multics interpretation. Technical report, MTR-2997, Mitre Corporation, Bedford, MA, 1976.
-
(1976)
Technical Report, MTR-2997
-
-
Bell, D.E.1
LaPadula, L.J.2
-
13
-
-
0345066667
-
The structure of design processes
-
ed. M. C. Yovtis, Academic Press
-
Dasgupta, S., The structure of design processes. In The Structure of Design Processes, 28 of Advances in Computers, ed. M. C. Yovtis, Academic Press, 1989, pp. 1-67.
-
(1989)
The Structure of Design Processes, 28 of Advances in Computers
, pp. 1-67
-
-
Dasgupta, S.1
-
14
-
-
0012359651
-
-
Prentice Hall International/European Space Agency
-
Mazza, C., Fairclough, J., Melton, B., de Pablo, D., Scheffer, A. and Stevens, E., Software Engineering Standards. Prentice Hall International/European Space Agency, 1994.
-
(1994)
Software Engineering Standards
-
-
Mazza, C.1
Fairclough, J.2
Melton, B.3
De Pablo, D.4
Scheffer, A.5
Stevens, E.6
-
15
-
-
0003885423
-
-
Addison-Wesley, Reading, MA
-
Sommerville, I., Software Engineering, 5th edn. Addison-Wesley, Reading, MA, 1996.
-
(1996)
Software Engineering, 5th Edn.
-
-
Sommerville, I.1
-
18
-
-
0024717026
-
Framework of a methodology for the lifecycle of computer security in an organisation
-
K. P. Badenhorst and J. H. P. Eloff, Framework of a methodology for the lifecycle of computer security in an organisation, Computers & Security, 8 (1989) 5.
-
(1989)
Computers & Security
, vol.8
, pp. 5
-
-
Badenhorst, K.P.1
Eloff, J.H.P.2
-
19
-
-
0011432676
-
Deficiencies of the traditional approach to information security and the requirements for a new methodology
-
J. Hitchings, Deficiencies of the traditional approach to information security and the requirements for a new methodology, Computers & Security, 14 (1995) 377-383.
-
(1995)
Computers & Security
, vol.14
, pp. 377-383
-
-
Hitchings, J.1
-
22
-
-
0026938531
-
The art of systems architecting
-
October
-
Rechtin, E. F., The art of systems architecting. IEEE Spectrum, 1992, October, pp. 66-69.
-
(1992)
IEEE Spectrum
, pp. 66-69
-
-
Rechtin, E.F.1
-
25
-
-
0347577436
-
-
European Computer Manufactors Association (ECMA), TR/46, July
-
Security in open systems, a security framework. European Computer Manufactors Association (ECMA), TR/46, July 1988.
-
(1988)
Security in Open Systems, a Security Framework
-
-
-
26
-
-
0346946550
-
Syteemontwikkeling: Vrijheid in gebondenheid
-
A. A. Vreven, Syteemontwikkeling: vrijheid in gebondenheid, Informatie, 36 (1994) 589-597.
-
(1994)
Informatie
, vol.36
, pp. 589-597
-
-
Vreven, A.A.1
-
27
-
-
0028514027
-
A taxonomy of computer program security flaws
-
C. E. Landwehr, A. R. Bull, J. P. McDermott and W. P. Choi, A taxonomy of computer program security flaws, ACM Computing Surveys, 26 (1994) 3.
-
(1994)
ACM Computing Surveys
, vol.26
, pp. 3
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.P.4
-
28
-
-
0029253405
-
Specifications and validation of a security policy model
-
A. Boswell, Specifications and validation of a security policy model, IEEE Transactions on Software Engineering, 21(2) (1995) 63-68.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.2
, pp. 63-68
-
-
Boswell, A.1
|