-
1
-
-
0141509901
-
Precluding incongruous behavior by aligning software requirements with security and privacy policies
-
A.I. Antón, J.B. Earp and R.A. Carter. Precluding Incongruous Behavior by Aligning Software Requirements with Security and Privacy Policies, Information and Software Technology, Vol. 45 (14), pp. 967-977, 2003.
-
(2003)
Information and Software Technology
, vol.45
, Issue.14
, pp. 967-977
-
-
Antón, A.I.1
Earp, J.B.2
Carter, R.A.3
-
2
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
I. Alexander. Misuse Cases: Use Cases with Hostile Intent. IEEE Software, Vol. 20 (1), pp. 58-66, 2003.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
4
-
-
1142309815
-
Provisions and obligations in policy rule management and security applications
-
C. Bettini, S. Jajodia, S. Wang, D. Wijesekera, Provisions and obligations in policy rule management and security applications, 28th Int 'I Conf. on Very Large Data Bases (VLDB'02), pp. 502-513, 2002.
-
(2002)
28th Int 'I Conf. on Very Large Data Bases (VLDB'02)
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Wang, S.3
Wijesekera, D.4
-
7
-
-
0141733117
-
Modelling access policies using roles in requirements engineering
-
Elsevier
-
R. Crook, D. Ince, and B. Nuseibeh. Modelling Access Policies Using Roles in Requirements Engineering, Information and Software Technology, 45(14), pp. 979-991, Elsevier, 2003.
-
(2003)
Information and Software Technology
, vol.45
, Issue.14
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
D.E. Denning. A Lattice Model of Secure Information Flow, Comm. of the ACM, 19(5), pp. 236-243, 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
12
-
-
0027574423
-
Goal-directed requirements acquisition
-
A. Dardenne, A. van Lamsweerde, and S. Fickas. Goal-Directed Requirements Acquisition, Science of Computer Programming, 20: 3-50, 1993.
-
(1993)
Science of Computer Programming
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
17
-
-
0016984825
-
Protection in operating systems
-
M.H. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in operating systems, Communications of the ACM, 19 (8), pp. 461-471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
20
-
-
33750948728
-
Security and Privacy Requirements Analysis Tool (SPRAT) software requirements specification version 2.00
-
April 9
-
N. Jain, A.I. Anton, W.H. Stufflebeam, and Q. He. Security and Privacy Requirements Analysis Tool (SPRAT) Software Requirements Specification Version 2.00, NCSU CS Technical Report TR-2004-7, April 9, 2004.
-
(2004)
NCSU CS Technical Report
, vol.TR-2004-7
-
-
Jain, N.1
Anton, A.I.2
Stufflebeam, W.H.3
He, Q.4
-
22
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M.L. Sapino, V.S. Subrahmanian. Flexible support for multiple access control policies, ACM Transactions on Database Systems (TODS), 26(2), pp. 214-260, 2001.
-
(2001)
ACM Transactions on Database Systems (TODS)
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
24
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
A. van Lamsweerde. Elaborating Security Requirements by Construction of Intentional Anti-Models. 26th Int'l Conf. on Software Engineering (ICSE'04), pp. 148-157, 2004.
-
(2004)
26th Int'l Conf. on Software Engineering (ICSE'04)
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
26
-
-
32044433021
-
-
Technical Report Number 2004/23, Department of Computing, Open University, UK
-
J.D. Moffett, C.B. Haley, and B. Nuseibeh. Core Security Requirements Artefacts. Technical Report Number 2004/23, Department of Computing, Open University, UK, 2004.
-
(2004)
Core Security Requirements Artefacts.
-
-
Moffett, J.D.1
Haley, C.B.2
Nuseibeh, B.3
-
30
-
-
0028401161
-
Inquiry-based requirements analysis
-
C. Potts, K. Takahashi and A.I. Anton. Inquiry-Based Requirements Analysis, IEEE Software, 11(2), pp. 21-32, 1994.
-
(1994)
IEEE Software
, vol.11
, Issue.2
, pp. 21-32
-
-
Potts, C.1
Takahashi, K.2
Anton, A.I.3
-
31
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman. Role-Based Access Control Models, IEEE Computer, 29(2), pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
33
-
-
85001776519
-
Transnational information sharing, event notification, rule enforcement and process coordination
-
S. Su, et al. Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination. Int'l Journal of Electronic Government Research (IJEGR), Vol. 1 (2), pp. 1-26, 2005.
-
(2005)
Int'l Journal of Electronic Government Research (IJEGR)
, vol.1
, Issue.2
, pp. 1-26
-
-
Su, S.1
-
34
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
LNCS 2171
-
P. Samarati, S. De Capitani di Vimercati. Access Control: Policies, Models, and Mechanisms, IFIP WG 1.7 Int'l School on Foundations of Security Analysis and Design (FOSAD 2000), LNCS 2171, pp. 137-196, 2001.
-
(2001)
IFIP WG 1.7 Int'l School on Foundations of Security Analysis and Design (FOSAD 2000)
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
35
-
-
85026689401
-
Modeling organizations for information systems requirements engineering
-
E. Yu. Modeling Organizations for Information Systems Requirements Engineering, 1st IEEE Int'l Symp. on Requirements Engineering, pp. 34-41,1993.
-
(1993)
1st IEEE Int'l Symp. on Requirements Engineering
, pp. 34-41
-
-
Yu, E.1
|