-
2
-
-
0001939240
-
Action research
-
D. Avison, F. Lau, M. Myers, and A. Nielsen Action research Communications of the ACM 42 1 1999 94 97
-
(1999)
Communications of the ACM
, vol.42
, Issue.1
, pp. 94-97
-
-
Avison, D.1
Lau, F.2
Myers, M.3
Nielsen, A.4
-
3
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
R. Baskerville Information systems security design methods: implications for information systems development ACM Computing Surveys 25 4 1993 375 415
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-415
-
-
Baskerville, R.1
-
8
-
-
16344386685
-
What Is There to Worry About? An Introduction to the Computer Security Problem
-
M. Abrams S. Jajodia H. Podell IEEE Computer Society Silver Spring, MD
-
D. Brinkley, and R. Schell What Is There to Worry About? An Introduction to the Computer Security Problem M. Abrams S. Jajodia H. Podell Information Security, An Integrated Collection of Essays 1995 IEEE Computer Society Silver Spring, MD
-
(1995)
Information Security, An Integrated Collection of Essays
-
-
Brinkley, D.1
Schell, R.2
-
13
-
-
84970947585
-
Software engineering for security: A roadmap
-
A. Finkelstein ACM Press New York
-
P. Devanbu, and S. Stubblebine Software engineering for security: a roadmap A. Finkelstein The Future of Software Engineering 2000 ACM Press New York 227 239
-
(2000)
The Future of Software Engineering
, pp. 227-239
-
-
Devanbu, P.1
Stubblebine, S.2
-
15
-
-
0002698747
-
Information system security management in the new millennium
-
G. Dhillon, and J. Backhouse Information system security management in the new millennium Communications of the ACM 43 7 2000 125 128
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
16
-
-
16344387616
-
-
Directive, Directive 95/46/CE of the European Parliament and Council, dated October 24th, about People protection regarding the personal data management and the free circulation of these data, DOCE L281, 23/11/1995 (95/46/CE) 0031-0050
-
Directive, Directive 95/46/CE of the European Parliament and Council, dated October 24th, about People protection regarding the personal data management and the free circulation of these data, DOCE L281, 23/11/1995 (95/46/CE) 0031-0050.
-
-
-
-
20
-
-
16344395064
-
Software verification and validation within (rational) unified process
-
IEEE, Greenbelt, Maryland
-
C. Fuhrman, F. Djlive, E. Palza, Software Verification and Validation within (Rational) Unified Process, Proceedings of 28th Annual NASA Goddard Software Engineering Workshop (SEW'03). IEEE, Greenbelt, Maryland, 2003, pp. 216-221.
-
(2003)
Proceedings of 28th Annual NASA Goddard Software Engineering Workshop (SEW'03)
, pp. 216-221
-
-
Fuhrman, C.1
Djlive, F.2
Palza, E.3
-
21
-
-
0036145519
-
Building software securely from the ground up
-
A. Ghosh, C. Howell, and J. Whittaker Building software securely from the ground up IEEE Software 19 1 2002 14 17
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 14-17
-
-
Ghosh, A.1
Howell, C.2
Whittaker, J.3
-
22
-
-
0036149234
-
Correctness by construction developing a commercial secure system
-
A. Hall, and R. Chapman Correctness by construction developing a commercial secure system IEEE Software 19 1 2002 18 25
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
24
-
-
16344376670
-
-
Information Security Governance Information Systems Audit and Control Foundation, USA
-
ISACF, Information Security Governance. Guidance for Boards of Directors and Executive Management, Information Systems Audit and Control Foundation, USA, 2001.
-
(2001)
Guidance for Boards of Directors and Executive Management
-
-
-
28
-
-
0006973722
-
Whatever happened to Object-Oriented Databases?
-
N. Leavitt Whatever happened to Object-Oriented Databases? Industry Trends. IEEE Computer Society 33 8 2000 16 19
-
(2000)
Industry Trends. IEEE Computer Society
, vol.33
, Issue.8
, pp. 16-19
-
-
Leavitt, N.1
-
30
-
-
0030195327
-
MOMT: A multi-level object modeling technique for designing secure database applications
-
D. Marks, P. Sell, and B. Thuraisingham MOMT: a multi-level object modeling technique for designing secure database applications Journal of Object-Oriented Programming 9 4 1996 22 29
-
(1996)
Journal of Object-Oriented Programming
, vol.9
, Issue.4
, pp. 22-29
-
-
Marks, D.1
Sell, P.2
Thuraisingham, B.3
-
31
-
-
16344381436
-
Database Design for Smarties
-
Morgan Kaufmann Publisher San Francisco, CA
-
R. Muller Database Design for Smarties Using UML for Data Modeling 1999 Morgan Kaufmann Publisher San Francisco, CA
-
(1999)
Using UML for Data Modeling
-
-
Muller, R.1
-
33
-
-
0003511049
-
-
Prentice-Hall Englewood Cliffs, NJ
-
J. Rumbaugh, M. Blaha, W. Premerlani, F. Eddy, and W. Lorensen Object-Oriented Modeling and Design 1991 Prentice-Hall Englewood Cliffs, NJ
-
(1991)
Object-oriented Modeling and Design
-
-
Rumbaugh, J.1
Blaha, M.2
Premerlani, W.3
Eddy, F.4
Lorensen, W.5
-
36
-
-
0026260025
-
Modeling security-relevant data semantics
-
G.W. Smith Modeling security-relevant data semantics IEEE Transactions on Software Engineering 17 11 1991 1195 1203
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1195-1203
-
-
Smith, G.W.1
|