-
1
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon, G. & Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM,. 43, 7, 125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
2
-
-
16344386685
-
What is there to worry about? An introduction to the computer security problem
-
Abrams, M., Jajodia, S. & Podell (Eds.), (Chapter 1). California, IEEE Computer Society
-
Brinkley, D. & Schell, R. (1995). What is there to worry about? An introduction to the computer security problem. In Abrams, M., Jajodia, S. & Podell (Eds.), Information security, an integrated collection of essays (Chapter 1). California, IEEE Computer Society.
-
(1995)
Information Security, an Integrated Collection of Essays
-
-
Brinkley, D.1
Schell, R.2
-
4
-
-
85112399481
-
-
Directive 95/46/CE of the European Parliament and Council, dated October 24th, about DOCE no. L281, 23/11/1995, P.0031-0050
-
Directive (95/467CE). Directive 95/46/CE of the European Parliament and Council, dated October 24th, about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031-0050.
-
People Protection Regarding the Personal Data Management and the Free Circulation of These Data
-
-
-
7
-
-
0036149234
-
Correctness by construction developing a commercial secure system
-
Hall, A. & Chapman, R. (2002). Correctness by construction developing a commercial secure system. IEEE Software, 19, 1, 18-25.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
8
-
-
0003696305
-
-
Boston/Dordrecht/London, Kluwer Academic Publishers
-
Chung, L., Nixon, B., Yu, E. & Mylopoulos, J. (2000). Non-functional requirements in software engineering. Boston/Dordrecht/London, Kluwer Academic Publishers.
-
(2000)
Non-functional Requirements in Software Engineering
-
-
Chung, L.1
Nixon, B.2
Yu, E.3
Mylopoulos, J.4
-
10
-
-
0030195327
-
MOMT: A multilevel object modeling technique for designing secure database applications
-
Marks, D., Sell, P. & Thuraisingham, B. (1996). MOMT: A multilevel object modeling technique for designing secure database applications. Journal of Object-Oriented Programming. 9, 4, 22-29.
-
(1996)
Journal of Object-Oriented Programming
, vol.9
, Issue.4
, pp. 22-29
-
-
Marks, D.1
Sell, P.2
Thuraisingham, B.3
-
11
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
Jézéquel, J., Hussmann, H. & Cook, S. (Eds.), Germany, Springer
-
Jürjens, J. (2002). UMLsec: Extending UML for secure systems development. In Jézéquel, J., Hussmann, H. & Cook, S. (Eds.), UML 2002 - The Unified Modeling Language, Model engineering, concepts and tools (pp. 412-425). Germany, Springer.
-
(2002)
UML 2002 - The Unified Modeling Language, Model Engineering, Concepts and Tools
, pp. 412-425
-
-
Jürjens, J.1
-
12
-
-
0004190705
-
-
Addison-Wesley
-
Castano, S., Fugini, M., Martella, G. & Samarati, P. (1994). Database Security. Addison-Wesley
-
(1994)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
15
-
-
14244256759
-
Oracle label security
-
Retrieved July 1, 2002
-
Levinger, J. (2002). Oracle label security. Administrator's guide. Release 2 (9.2). Retrieved July 1, 2002, from http://www.csis.gvsu.edu/GeneralInfo/Oracle/network.920/a96578.pdf.
-
(2002)
Administrator's Guide. Release 2 (9.2)
-
-
Levinger, J.1
-
16
-
-
0001939240
-
Action research
-
Avison, D., Lau, F., Myers, M. & Nielsen, A. (1999). Action research. Communications of the ACM, 42(1), 94-97.
-
(1999)
Communications of the ACM
, vol.42
, Issue.1
, pp. 94-97
-
-
Avison, D.1
Lau, F.2
Myers, M.3
Nielsen, A.4
-
19
-
-
0006973722
-
Whatever happened to Object-Oriented Databases?
-
August
-
Leavitt, N. (2000). Whatever happened to Object-Oriented Databases?. Industry Trends, IEEE Computer Society, August, 16-19.
-
(2000)
Industry Trends, IEEE Computer Society
, pp. 16-19
-
-
Leavitt, N.1
-
20
-
-
3042537739
-
Temporal OCL: Meeting specification demands for business components
-
Siau, K. & Halpin, T. (Eds.), (Chapter 10). Hersey, PA., Idea Group Publishing
-
Conrad, C. & Turowski, K. (2001). Temporal OCL: Meeting specification demands for business components. In Siau, K. & Halpin, T. (Eds.), Unified modeling language: Systems analysis, design and development issues (Chapter 10). Hersey, PA., Idea Group Publishing.
-
(2001)
Unified Modeling Language: Systems Analysis, Design and Development Issues
-
-
Conrad, C.1
Turowski, K.2
-
21
-
-
27644567989
-
Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection
-
IEEE Computer Society
-
Toval, A., Olmos, A & Piattini, M. (2002). Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection. IEEE Joint International Requirements Engineering Conference (RE'02). IEEE Computer Society, 95-103.
-
(2002)
IEEE Joint International Requirements Engineering Conference (RE'02)
, pp. 95-103
-
-
Toval, A.1
Olmos, A.2
Piattini, M.3
|