-
4
-
-
84944039217
-
Translating role-based access control within context
-
Bristol, UK, Jan. Springer
-
J. Bacon, M. Lloyd, and K. Moody, "Translating Role-based Access Control within Context", Proc. of Int. Workshop Policies for Distributed Systems and Networks (Policy 2001), Bristol, UK, Jan. 2001, Springer, 107-119.
-
(2001)
Proc. of Int. Workshop Policies for Distributed Systems and Networks (Policy 2001)
, pp. 107-119
-
-
Bacon, J.1
Lloyd, M.2
Moody, K.3
-
10
-
-
0141733117
-
Modelling access policies using roles in Requirements engineering
-
November Elsevier
-
R. Crook, D. Ince, and B. Nuseibeh, "Modelling Access Policies Using Roles in requirements Engineering", Information and Software Technology, 45(14): 979-991, November 2003, Elsevier.
-
(2003)
Information and Software Technology
, vol.45
, Issue.14
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
13
-
-
84888773622
-
A policy deployment model for the ponder language
-
Seattle, USA, May
-
N. Dulay, E. Lupu, M Sloman, and N. Damianou, "A Policy Deployment Model for the Ponder Language", Proc. IEEE/IFIP Intl. Symposium on Integrated Network Management (IM'2001), Seattle, USA, May 2001.
-
(2001)
Proc. IEEE/IFIP Intl. Symposium on Integrated Network Management (IM'2001)
-
-
Dulay, N.1
Lupu, E.2
Sloman, M.3
Damianou, N.4
-
14
-
-
0027928280
-
Organisational requirements definition for information technology systems
-
Colorado Springs, Colorado, USA,18-22 April
-
st IEEE Int. Conference on Requirements Engineering (ICRE '94), 158-165, Colorado Springs, Colorado, USA,18-22 April 1994.
-
(1994)
st IEEE Int. Conference on Requirements Engineering (ICRE '94)
, pp. 158-165
-
-
Dobson, J.E.1
Strens, M.R.2
-
15
-
-
0027574423
-
Goal-directed requirements acquisition
-
A. Dardenne, A. van Lamsweerde, and S. Fickas, "Goal-directed Requirements Acquisition", Science of Computer Programming, Volume 20, 1993.
-
(1993)
Science of Computer Programming
, vol.20
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
16
-
-
27644482133
-
Goal oriented elaboration of security requirements
-
Universite Catholique de Louvain, Belgium
-
P. Fontaine, "Goal oriented elaboration of security requirements", Project Dissertation, Universite Catholique de Louvain, Belgium, 2001.
-
(2001)
Project Dissertation
-
-
Fontaine, P.1
-
23
-
-
84898316272
-
Formal specification, A roadmap
-
A. Finkelstein (Ed.), ACM Press, June
-
A. Lamsweerde, "Formal Specification, A Roadmap", ICSE-2000 Future of Software Engineering, A. Finkelstein (Ed.), ACM Press, June 2000.
-
(2000)
ICSE-2000 Future of Software Engineering
-
-
Lamsweerde, A.1
-
26
-
-
0030677524
-
A logical language for expressing authorisations
-
Oakland, USA, May
-
S. Jajodia, P Samarati, and V.S. Sabrahmanian, "A Logical Language for Expressing Authorisations", Proc. of IEEE Symposium on Research in Security and Privacy, 31-42 Oakland, USA, May 1997.
-
(1997)
Proc. of IEEE Symposium on Research in Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Sabrahmanian, V.S.3
-
35
-
-
0023965320
-
The source of authority for commercial access control
-
J. D. Moffett and Morris S. Sloman, "The Source of Authority for Commercial Access Control", IEEE Computer 21(2): 59-69.1988.
-
(1988)
IEEE Computer
, vol.21
, Issue.2
, pp. 59-69
-
-
Moffett, J.D.1
Sloman, M.S.2
-
37
-
-
0030086382
-
Role based access control models
-
Feb.
-
R. Sandhu, E. Coyne,H. Feinstaein, C. Youmann, "Role Based Access Control Models", IEEE Computer, 29(2): 38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstaein, H.3
Youmann, C.4
-
38
-
-
2442475798
-
-
PhD Thesis, Dept. of Computer Science, University of York, UK
-
A. Schaad, "Framework for Organisational Control Principles", PhD Thesis, Dept. of Computer Science, University of York, UK, 2003.
-
(2003)
Framework for Organisational Control Principles
-
-
Schaad, A.1
-
39
-
-
0028384062
-
Responsibility modelling as a technique for requirements definition
-
M.R. Strens and J.E. Dobson, "Responsibility Modelling as a Technique for Requirements Definition", IEE Intelligent Systems Engineering, 3(1): 20-26, 1994.
-
(1994)
IEE Intelligent Systems Engineering
, vol.3
, Issue.1
, pp. 20-26
-
-
Strens, M.R.1
Dobson, J.E.2
-
40
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
20-23 Nov.
-
G. Sindre and A. L. Opdahl, "Eliciting Security Requirements by Misuse Cases", Proc. of TOOLS Pacific 2000, 120-131, 20-23 Nov. 2000.
-
(2000)
Proc. of TOOLS Pacific 2000
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
47
-
-
0141470169
-
-
PhD Thesis, Department of Computer Science, University of Toronto, Canada
-
E. Yu, "A Framework for Organizational Modeling", PhD Thesis, Department of Computer Science, University of Toronto, Canada, 1995.
-
(1995)
A Framework for Organizational Modeling
-
-
Yu, E.1
|