-
2
-
-
6744247045
-
Logical Controls Specification: An approach to information system security
-
H. Klein & K. Kumar (eds.), Amsterdam: North-Holland
-
Baskerville, R., (1989), Logical Controls Specification: An approach to information system security. In H. Klein & K. Kumar (eds.) systems development for human progress. Amsterdam: North-Holland.
-
(1989)
Systems Development for Human Progress
-
-
Baskerville, R.1
-
3
-
-
77957322954
-
Information Security: Adapting to Survive
-
Vol., no., pp
-
Baskerville, R., (1993), Information Security: Adapting to Survive. Information Systems Security. Vol. 2, no. 1, pp. 40-47.
-
(1993)
Information Systems Security
, vol.2
, Issue.1
, pp. 40-47
-
-
Baskerville, R.1
-
4
-
-
84897776115
-
The Second-Order Security Dilemma
-
W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.), London: Chapman & Hall, pp
-
Baskerville, R., (1995), The Second-Order Security Dilemma. in W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.) Information Technology and Changes in Organizational Work. London: Chapman & Hall, pp. 239-249.
-
(1995)
Information Technology and Changes in Organizational Work
, pp. 239-249
-
-
Baskerville, R.1
-
5
-
-
0029253405
-
Specification and validation of a security policy model
-
February, vol., issue, pp
-
Boswell, A., (1995), Specification and validation of a security policy model. IEEE Transaction on Software Engineering. February, vol. 21, issue 2, pp. 63-68.
-
(1995)
IEEE Transaction on Software Engineering
, vol.21
, Issue.2
, pp. 63-68
-
-
Boswell, A.1
-
6
-
-
0004190705
-
-
Addison Wesley
-
Castano, S., Fugini, M., Martell, G., & Samarati, P., (1995), Database Security. Addison Wesley.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martell, G.3
Samarati, P.4
-
10
-
-
0023348314
-
The development of proof a formal specification for a multilevel secure system
-
Vol.,., issue,. Pp
-
Glasgow, J.I & MacEwen, G.H., (1987), The development of proof a formal specification for a multilevel secure system. ACM Transactions on Computer Systems. Vol. 5., issue 2. Pp. 151-184.
-
(1987)
ACM Transactions on Computer Systems
, vol.5
, Issue.2
, pp. 151-184
-
-
Glasgow, J.I.1
Macewen, G.H.2
-
11
-
-
84870173215
-
End-User Computing Security Guidelines
-
Vol., No
-
Hale, R., (1996), End-User Computing Security Guidelines. Information System Security. Vol. 6, No.1.
-
(1996)
Information System Security
, vol.6
, Issue.1
-
-
Hale, R.1
-
12
-
-
0003946745
-
-
Oxford University Press, Oxford, UK
-
Hare, R.M., (1981 ), Moral Thinking: its levels, methods and point. Oxford University Press, Oxford, UK.
-
(1981)
Moral Thinking: Its Levels, Methods and Point
-
-
Hare, R.M.1
-
13
-
-
0011648740
-
-
The IFIP Pink Summary-36 years of IFIP. Edited by H. Zemanek, Laxenburg, IFIP
-
Jarvinen, P., (1997), The new classification of research approaches. The IFIP Pink Summary-36 years of IFIP. Edited by H. Zemanek, Laxenburg, IFIP.
-
(1997)
The New Classification of Research Approaches
-
-
Jarvinen, P.1
-
15
-
-
84986173272
-
Internet acceptable usage policy for organizations
-
Vol., no., pp
-
Lichtenstein, S. & Swatrnan, P.M.C., (1997), Internet acceptable usage policy for organizations. Information Management and Computer Security. Vol. 5, no. 5, pp. 182-190.
-
(1997)
Information Management and Computer Security
, vol.5
, Issue.5
, pp. 182-190
-
-
Lichtenstein, S.1
Swatrnan, P.M.C.2
-
16
-
-
0029545652
-
A New Model for Information Security Policies
-
Vol., No., p
-
Lindup, K. R., (1995), A New Model for Information Security Policies. Computer & Security, Vol. 14, No. 8, p. 691-695.
-
(1995)
Computer & Security
, vol.14
, Issue.8
, pp. 691-695
-
-
Lindup, K.R.1
-
18
-
-
0025211594
-
-
IEEE Computer. January, vol., issue, pp
-
McLean, J., (1990), The specification and modelling of computer security. IEEE Computer. January, vol. 23, issue I, pp. 9-16.
-
(1990)
The Specification and Modelling of Computer Security
, vol.23
, pp. 9-16
-
-
McLean, J.1
-
21
-
-
19344364618
-
-
Advances in Computers, Academic Press
-
Sandhu, R., (1998), Role-Based Access Control. Advances in Computers, Vol.46, Academic Press.
-
(1998)
Role-Based Access Control
, vol.46
-
-
Sandhu, R.1
-
22
-
-
0027699087
-
Lattice-based access controls
-
Pp
-
Sandhu, R.S, (1993), Lattice-based access controls. IEEE Computer. Pp. 9-19.
-
(1993)
IEEE Computer
, pp. 9-19
-
-
Sandhu, R.S.1
-
23
-
-
0028513932
-
Access Control: Principle and Practice
-
vol., issue, pp
-
Sandhu, R., & Samarati, P., (1994), Access Control: Principle and Practice. IEEE Communications vol. 32, issue 9, pp. 40-48.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
24
-
-
84857335132
-
The role of policy in requirements definition
-
Sibley, E.H., Wexelblat, R.L., Michael, J.B., Tanner, M.C., & Littman, D.C., (1993), The role of policy in requirements definition. Proceedings of the IEEE International Symposium on Requirements Engineering.
-
(1993)
Proceedings of the IEEE International Symposium on Requirements Engineering
-
-
Sibley, E.H.1
Wexelblat, R.L.2
Michael, J.B.3
Tanner, M.C.4
Littman, D.C.5
-
25
-
-
85066135140
-
-
15th IFIP World Computer Congress. 'The Global Information Society on the Way to the Next Millennium'. SEC, TC11. Vienna
-
Spruit, M.E.M, (1998), Competing against human failing. 15th IFIP World Computer Congress. 'The Global Information Society on the Way to the Next Millennium'. SEC, TC11. Vienna.
-
(1998)
Competing against Human Failing
-
-
Spruit, M.E.M.1
-
26
-
-
0000280419
-
Effective IS Security: An empirical Study
-
June
-
Straub, D. W., (1990), Effective IS Security: An empirical Study. Information System Research. Vol. 1, Number 2, June, p. 255-277.
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
27
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models for Management Decision Making
-
Vol., No., p
-
Straub, D.W. & Welke, R.J., (1998), Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly, Vol. 22, No.4, p. 441-464
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
30
-
-
0000241259
-
Growing Systems in Emergent Organizations
-
Vol., No., pp
-
Truex, D.P., Baskerville, R. & Klein, H., (1999), Growing Systems in Emergent Organizations. Communications of the ACM. Vol. 42, No.8, pp. 117-123.
-
(1999)
Communications of the ACM
, vol.42
, Issue.8
, pp. 117-123
-
-
Truex, D.P.1
Baskerville, R.2
Klein, H.3
-
31
-
-
0039639238
-
Organizational computer security policy: The reality
-
Vol., no., pp
-
Warman, A.R., (1992), Organizational computer security policy: the reality. European Journal oflnformation Systems. Vol. 1, no. 5, pp. 305-310.
-
(1992)
European Journal Oflnformation Systems
, vol.1
, Issue.5
, pp. 305-310
-
-
Warman, A.R.1
-
32
-
-
0000613590
-
Writing InfoSec Policies
-
Vol., No., p
-
Wood, C.C., (1995), Writing InfoSec Policies. Computer & Security, Vol. 14, No. 8, p. 667-674.
-
(1995)
Computer & Security
, vol.14
, Issue.8
, pp. 667-674
-
-
Wood, C.C.1
-
33
-
-
84992989148
-
Constructing difficult-to-guess passwords
-
Vol., no., pp
-
Wood, C.C., (1996a), Constructing difficult-to-guess passwords. Information Management & Computer Security. Vol. 4, no.l, pp. 43-44.
-
(1996)
Information Management & Computer Security
, vol.4
, pp. 43-44
-
-
Wood, C.C.1
-
35
-
-
84993043234
-
A Policy for sending secret information over communications networks
-
Vol., no
-
Wood, C.C., (1996c), A Policy for sending secret information over communications networks. Information Management & Computer Security. Vol. 4, no.3.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.3
-
-
Wood, C.C.1
-
36
-
-
84993093101
-
Part ofthe foundation for secure systems: Separation of duties policy
-
Vol., no., pp
-
Wood, C.C., (1997a), Part ofthe foundation for secure systems: separation of duties policy. Information Management & Computer Security. Vol. 5, no.1, pp. 18-19.
-
(1997)
Information Management & Computer Security
, vol.5
, Issue.1
, pp. 18-19
-
-
Wood, C.C.1
-
37
-
-
84993081932
-
A secure password storage policy
-
Vol., no., pp
-
Wood, C.C., (1997b), A secure password storage policy. Information Management & Computer Security. Vol. 5, no.2, pp. 79-80.
-
(1997)
Information Management & Computer Security
, vol.5
, Issue.2
, pp. 79-80
-
-
Wood, C.C.1
-
38
-
-
0029766635
-
Role-Based Security for Distributed Object Systems
-
Yialelis, N., Lupu, E., & Sloman, M., (1996), Role-Based Security for Distributed Object Systems. Proceedings of the 5th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'96).
-
(1996)
Proceedings of the 5Th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'96)
-
-
Yialelis, N.1
Lupu, E.2
Sloman, M.3
|