-
1
-
-
0029697680
-
-
Anderson, R. A Security Policy Model for Clinical Information Systems. IEEE Symposium on Security and Privacy, Los Alamitos, 1996. pp. 30-43.
-
Anderson, R. A Security Policy Model for Clinical Information Systems. IEEE Symposium on Security and Privacy, Los Alamitos, 1996. pp. 30-43.
-
-
-
-
3
-
-
84979855000
-
Dealing with Security Requirements During the Development of Information Systems. Proc. CAiSE'93
-
Systems Engineering, Collette Rolland, Francois Bodart, Corine Cauvet Eds, Springer
-
th Int. Conf. Advanced Information Systems Engineering, Collette Rolland, Francois Bodart, Corine Cauvet (Eds.). Springer, 1993. pp.234-251
-
(1993)
th Int. Conf. Advanced Information
, pp. 234-251
-
-
Chung, L.1
-
4
-
-
0003696305
-
-
Kluwer Academic Publishers
-
Chung, L., Nixon, B. A., Yu, E. and Mylopoulos, J. Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, 2000.
-
(2000)
Non-Functional Requirements in Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
5
-
-
27644537252
-
-
Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176
-
Modeling Security Requirements Through Ownership, Permission and Delegation
, vol.RE 2005
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
John Mylopoulos, N.Z.3
-
6
-
-
15944398393
-
-
Helmer, G., Wong, J., Slagell, M., Honavar, V. Miller, L., Lutz, R. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Anton, Requirements Engineering. 7, N0. 4, 2002. pp. 177-220.
-
Helmer, G., Wong, J., Slagell, M., Honavar, V. Miller, L., Lutz, R. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Anton, Requirements Engineering. Vol. 7, N0. 4, 2002. pp. 177-220.
-
-
-
-
9
-
-
0030086382
-
-
Sandhu, R. S., Coyne, E.J., Feinstein, H.L., Youman, C.E. Role-Based Access Control Models. IEEE Computer, 29, No.2, Feburary 1996. pp. 38-47.
-
Sandhu, R. S., Coyne, E.J., Feinstein, H.L., Youman, C.E. Role-Based Access Control Models. IEEE Computer, Vol.29, No.2, Feburary 1996. pp. 38-47.
-
-
-
-
10
-
-
0037252218
-
Good-Enough Security: Towards a Pragmatic Business-Driven Discipline
-
January/February
-
Sandu, R. Good-Enough Security: Towards a Pragmatic Business-Driven Discipline. IEEE Internet Computing. Security Track. January/February 2003. pp. 66-68.
-
(2003)
IEEE Internet Computing. Security Track
, pp. 66-68
-
-
Sandu, R.1
-
16
-
-
84942921136
-
-
Yu, E. and Liu, L. Modeling Trust for System Design Using the i* Strategic Actors Framework. In: Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer,2001. pp.175-194.
-
Yu, E. and Liu, L. Modeling Trust for System Design Using the i* Strategic Actors Framework. In: Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer,2001. pp.175-194.
-
-
-
-
17
-
-
84959052904
-
Agent-Oriented Modelling: Software Versus the World
-
Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings, Springer Verlag, pp
-
Yu,E. Agent-Oriented Modelling: Software Versus the World. Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings. LNCS 2222. Springer Verlag, pp. 206-225.
-
LNCS
, vol.2222
, pp. 206-225
-
-
Yu, E.1
|