-
3
-
-
0011519737
-
-
1995, Quality Attributes, Technical Report, CMU/SEI-95-TR-021, ESC-95-TR-021
-
Barbacci M. et al. (1995), Quality Attributes, Technical Report, CMU/SEI-95-TR-021, ESC-95-TR-021.
-
-
-
Barbacci, M.1
-
4
-
-
0004066512
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Bruce, G. and Dempsey, R. (1997), Security in Distributed Computing, Prentice-Hall, Englewood Cliffs, NJ.
-
(1997)
Security in Distributed Computing
-
-
Bruce, G.1
Dempsey, R.2
-
6
-
-
0011510134
-
A framework for reengineering three-tier client server systems on the Web
-
Chan, M.T. (1998), "A framework for reengineering three-tier client server systems on the Web", International Journal of Applied Software Technology, Vol. 4 No. 4, pp. 123-48.
-
(1998)
International Journal of Applied Software Technology
, vol.4
, Issue.4
, pp. 123-148
-
-
Chan, M.T.1
-
7
-
-
0002296440
-
Modeling Web application architectures with UML
-
October
-
Conallen, J. (1999), "Modeling Web application architectures with UML", Communications of the ACM, Vol. 42 No. 10, October, pp. 63-71.
-
(1999)
Communications of the ACM
, vol.42
, Issue.10
, pp. 63-71
-
-
Conallen, J.1
-
9
-
-
0002096587
-
UML 2001: A standardization odyssey
-
October
-
Kobryn, C. (1999), "UML 2001: a standardization odyssey", Comm. of the ACM, Vol. 42 No. 10, October, pp. 29-37.
-
(1999)
Comm. of the ACM
, vol.42
, Issue.10
, pp. 29-37
-
-
Kobryn, C.1
-
10
-
-
84986089117
-
A hypertext information security model for organisations
-
Kwok, L.F. (1997), "A hypertext information security model for organisations", Information Management and Computer Security, Vol. 5 No. 4, pp. 138-48.
-
(1997)
Information Management and Computer Security
, vol.5
, Issue.4
, pp. 138-148
-
-
Kwok, L.F.1
-
11
-
-
0030385768
-
A security officers' workbench
-
Kwok, L.F. and Longley, D. (1996), "A security officers' workbench", Computers and Security, Vol. 15 No. 8, pp. 695-705.
-
(1996)
Computers and Security
, vol.15
, Issue.8
, pp. 695-705
-
-
Kwok, L.F.1
Longley, D.2
-
12
-
-
0011508763
-
Information security management and modelling
-
Kwok, L.F. and Longley D. (1999), "Information security management and modelling", Information Management & Computer Security, Vol. 7 No. 1, pp. 30-9.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.1
, pp. 30-39
-
-
Kwok, L.F.1
Longley, D.2
-
13
-
-
0001854263
-
Designing component-based frameworks using patterns in the UML
-
October
-
Larsen G. (1999), "Designing component-based frameworks using patterns in the UML", Communications of the ACM, Vol. 42 No. 10, October, pp. 38-45.
-
(1999)
Communications of the ACM
, vol.42
, Issue.10
, pp. 38-45
-
-
Larsen, G.1
-
15
-
-
0011421303
-
-
white paper (last updated 19 November, 1999)
-
Microsoft (1999), DCOM Architecture, white paper, available at: http://www.microsoft.com/com/wpaper/default.asp#DCOMPapers (last updated 19 November, 1999).
-
(1999)
DCOM Architecture
-
-
-
17
-
-
0011463327
-
Panel: Alternative assurances; Implementation of better ways!
-
Baltimore, MD, October
-
Proceedings of the 20th National Information Systems Security Conference, "Panel: alternative assurances: implementation of better ways!", Baltimore, MD, October 1997, pp. 712-13.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 712-713
-
-
-
18
-
-
0011420638
-
-
last updated 24 March 2001
-
World Wide Web Consortium (2001), World Wide Web Security FAQ, available at: http:// www.w3.org/security/faq/www-security-faq.html (last updated 24 March 2001).
-
(2001)
World Wide Web Security FAQ
-
-
|