-
2
-
-
1842829828
-
-
National Institute of Standards and Technology (NIST), SP 800-30. January (accessed January 2006)
-
Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology (NIST), SP 800-30. January 2002. http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf (accessed January 2006)
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
-
4
-
-
33845231427
-
Specifying information-flow controls
-
Columbus, Ohio, USA. IEEE Computer Society
-
Chivers, H. and Jacob, J. Specifying Information-Flow Controls, Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05), Columbus, Ohio, USA. IEEE Computer Society, 2005; 114-120.
-
(2005)
Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05)
, pp. 114-120
-
-
Chivers, H.1
Jacob, J.2
-
5
-
-
33845214117
-
-
Thesis at Department of Computer Science, The University of York, York, UK, (accessed July 2006).
-
Chivers, H., Security Design Analysis, Thesis at Department of Computer Science, The University of York, York, UK, available on-line at http://www.cs.york.ac.uk/ftpdir/reports/YCST-2006-06.pdf, (accessed July 2006). p. 484. 2006
-
(2006)
Security Design Analysis
, pp. 484
-
-
Chivers, H.1
-
6
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R., Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys, 1993.25(4). 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
7
-
-
84941189169
-
-
Insight Consulting Limited, (accessed May 2005)
-
CRAMM Risk Assessment Tool Overview, Insight Consulting Limited, available at http://www.cramm.com/riskassesment.htm (accessed May 2005)
-
CRAMM Risk Assessment Tool Overview
-
-
-
8
-
-
22144453559
-
Model-based security risk analysis for web applications: The CORAS approach
-
St Anne's College, Oxford, UK. (Electronic Workshops in Computing). British Computer Society, (accessed January 2006)
-
Dimitrakos, T., Raptis, D., Ritchie, B., and Stølen, K. Model-Based Security Risk Analysis for Web Applications: The CORAS approach, Proceedings of the EuroWeb 2002, St Anne's College, Oxford, UK. (Electronic Workshops in Computing). British Computer Society, available on-line at http://ewic.bcs.org/conferences/2002/euroweb/index.htm (accessed January 2006), 2002.
-
(2002)
Proceedings of the EuroWeb 2002
-
-
Dimitrakos, T.1
Raptis, D.2
Ritchie, B.3
Stølen, K.4
-
10
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
Proceedings of the Fundamental Approaches to Software Engineering : 4th International Conference, FASE 2001 : Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001, Genova, Italy. Springer-Verlag
-
Jürjens, J. Towards Development of Secure Systems Using UMLsec, Proceedings of the Fundamental Approaches to Software Engineering : 4th International Conference, FASE 2001 : Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001, Genova, Italy. (Lecture Notes in Computer Science vol 2029). Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science Vol 2029
-
-
Jürjens, J.1
-
11
-
-
33845224346
-
Security requirements engineering for e-govemment applications: Analysis of current frameworks
-
Proceedings of the Electronic Government: Third International Conference, EGOV 2004, Zaragoza, Spain. Springer-Verlag
-
Kalloniatis, C. Security Requirements Engineering for e-Govemment Applications: Analysis of Current Frameworks, Proceedings of the Electronic Government: Third International Conference, EGOV 2004, Zaragoza, Spain. (Lecture Notes in Computer Science vol 3183 / 2004), Springer-Verlag, 2004; 66-71.
-
(2004)
Lecture Notes in Computer Science Vol 3183 / 2004
, pp. 66-71
-
-
Kalloniatis, C.1
-
13
-
-
0005314068
-
-
National Computer Security Center (NCSC), Technical Report 79-91. (accessed January 2006)
-
Mayfield, T., Roskos, J. E., Welke, S. R., and Boone, J. M., Integrity in Automated Information Systems, National Computer Security Center (NCSC), Technical Report 79-91. http://www.radium.ncsc.mil/tpep/library/rainbow/C-TR-79- 91.txt (accessed January 2006)
-
Integrity in Automated Information Systems
-
-
Mayfield, T.1
Roskos, J.E.2
Welke, S.R.3
Boone, J.M.4
|