-
1
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
A.I. Antòn, and J.B. Earp A requirements taxonomy for reducing web site privacy vulnerabilities Requir. Eng. 9 3 2004 169 185
-
(2004)
Requir. Eng.
, vol.9
, Issue.3
, pp. 169-185
-
-
Antòn, A.I.1
Earp, J.B.2
-
2
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
L. Liu, E.S.K. Yu, and J. Mylopoulos Security and privacy requirements analysis within a social setting Proc. of RE'03 2003 151 161
-
(2003)
Proc. of RE'03
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
3
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone Requirements engineering meets trust management: model, methodology, and reasoning Proc. of iTrust-04, LNCS 2995 2004 176 190
-
(2004)
Proc. of iTrust-04, LNCS 2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulous, J.3
Zannone, N.4
-
5
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
A. van Lamsweerde, S. Brohez, R. De Landt-sheer, and D. Janssens From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering Proc. of RHAS'03 2003 49 56
-
(2003)
Proc. of RHAS'03
, pp. 49-56
-
-
Van Lamsweerde, A.1
Brohez, S.2
De Landt-Sheer, R.3
Janssens, D.4
-
7
-
-
17744364435
-
Information technology-code of practice for information security management
-
ISO/IEC Information technology-code of practice for information security management ISO/IEC 17799 2000
-
(2000)
ISO/IEC 17799
-
-
-
8
-
-
4944223328
-
Cassandra: Flexible trust management, applied to electronic health records
-
M.Y. Becker, and P. Sewell Cassandra: flexible trust management, applied to electronic health records Proc. of CSFW'04 2004 139 154
-
(2004)
Proc. of CSFW'04
, pp. 139-154
-
-
Becker, M.Y.1
Sewell, P.2
-
9
-
-
0042468094
-
Paper: A study on the certification of the information security management systems
-
A.R.-W. Fung, K.-J. Farn, and A.C. Lin Paper: a study on the certification of the information security management systems Comput. Stand. Interfaces 25 5 2003 447 461
-
(2003)
Comput. Stand. Interfaces
, vol.25
, Issue.5
, pp. 447-461
-
-
Fung, A.R.-W.1
Farn, K.-J.2
Lin, A.C.3
-
10
-
-
35048857793
-
Filling the gap between requirements engineering and public key/trust management infrastructures
-
P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone Filling the gap between requirements engineering and public key/trust management infrastructures Proc. of EuroPKI'04, LNCS 3093 2004 98 111
-
(2004)
Proc. of EuroPKI'04, LNCS 3093
, pp. 98-111
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulous, J.3
Zannone, N.4
-
11
-
-
17744387515
-
Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation
-
Univ. di Trento
-
F. Massacci, M. Prest, N. Zannone, Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation, Technical Report DIT-04-103, Univ. di Trento 2004. Available on the web at http://eprints.biblio.unitn.it.
-
(2004)
Technical Report
, vol.DIT-04-103
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
12
-
-
0041524980
-
Information security governance
-
P. Williams Information security governance Inf. Secur. Tech. Rep. 6 3 2001 60 70
-
(2001)
Inf. Secur. Tech. Rep.
, vol.6
, Issue.3
, pp. 60-70
-
-
Williams, P.1
-
13
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, and A. Perini TROPOS: an agent-oriented software development methodology JAAMAS 8 3 2004 203 236
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
|