-
1
-
-
35048879669
-
Special Issue on: Identity Management
-
Buell, D.A., Sandu, R. eds. November/December
-
Buell, D.A., Sandu, R. eds. Special Issue on: Identity Management. IEEE Internet Computing, November/December, 2003. pp.26-52.
-
(2003)
IEEE Internet Computing
, pp. 26-52
-
-
-
2
-
-
0003696305
-
-
Kluwer Academic Publishers
-
Chung, L., Nixon, B. A., Yu, E. and Mylopoulos, J. Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, 2000.
-
(2000)
Non-Functional Requirements in Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
3
-
-
1142301905
-
Managing Multiple and Dependable Identities
-
Damiani, E., Vimercati, S.D.C., Damarati, P. Managing Multiple and Dependable Identities. IEEE Internet Computing, November/December, 2003. pp.29-37.
-
(2003)
IEEE Internet Computing, November/December
, pp. 29-37
-
-
Damiani, E.1
Vimercati, S.D.C.2
Damarati, P.3
-
4
-
-
0034829309
-
Requirements Modeling for Organization Networks: A (Dis-)Trust -Based Approach
-
Gans, G., M. Jarke, S. Kethers, G. Lakemayer, E. Ellrich, C. Funken. Requirements Modeling for Organization Networks: A (Dis-)Trust -Based Approach, in Int. Symp. Requirements Engineering, 2001.
-
(2001)
Int. Symp. Requirements Engineering
-
-
Gans, G.1
Jarke, M.2
Kethers, S.3
Lakemayer, G.4
Ellrich, E.5
Funken, C.6
-
5
-
-
0033716145
-
Requirements Engineering in Year 2000 - A Research Perspective
-
Limerick, ACM Press, 2000. Also available at: //ftp.info.ucl.ac.be/pub/ publi/2 000/icse2000avl.pdf.
-
Lamsweerde, A. Requirements Engineering in Year 2000 - A Research Perspective, in Proceeding of 22nd International Conference on Software Engineering(ICSE 2000), Limerick, ACM Press, 2000. Also available at: //ftp.info.ucl.ac.be/pub/publi/2 000/icse2000avl.pdf.
-
Proceeding of 22nd International Conference on Software Engineering(ICSE 2000)
-
-
Lamsweerde, A.1
-
6
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
Monterey, California, September
-
Liu, L., E. Yu and J. Mylopoulos. Security and Privacy Requirements Analysis within a Social Setting. Proceedings of International Conference on Requirements Engineering (RE'03), Monterey, California, September 2003. pp.151-161.
-
(2003)
Proceedings of International Conference on Requirements Engineering (RE'03)
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
7
-
-
0942288555
-
Designing Information Systems in Social Context: A Goal and Scenario Modelling Approach
-
Elsevier Ltd.
-
Liu, L., E. Yu. Designing Information Systems in Social Context: A Goal and Scenario Modelling Approach. Information Systems, Vol.29, No.2.2003, Elsevier Ltd. pp.187-203.
-
(2003)
Information Systems
, vol.29
, Issue.2
, pp. 187-203
-
-
Liu, L.1
Yu, E.2
-
8
-
-
35048871048
-
-
. The National Electronic Commerce Coordinating Council. Identity Management: A White Paper. Available at: http://www.ec3.org/Downloads/2002/ id_management.pdf.
-
. The National Electronic Commerce Coordinating Council. Identity Management: A White Paper. Available at: http://www.ec3.org/Downloads/2002/ id_management.pdf.
-
-
-
-
9
-
-
35048850888
-
-
OASIS SAML 1.0 Domain Model. Available at: http://www.oasis-open.org/ committees/security/docs/draft-sstc-use-domain-05.pdf.
-
OASIS SAML 1.0 Domain Model. Available at: http://www.oasis-open.org/ committees/security/docs/draft-sstc-use-domain-05.pdf.
-
-
-
-
10
-
-
0030086382
-
Role-Based Access Control Models
-
Feburary 1996.
-
Sandhu, R. S., Coyne, E.J., Eeinstein, H.L., Youman, C.E. Role-Based Access Control Models. IEEE Computer, Vol.29, No.2, Feburary 1996. pp. 38-47.
-
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Eeinstein, H.L.3
Youman, C.E.4
-
13
-
-
33745782245
-
Designing for Privacy and Other Competing Requirements
-
Raleigh, North Carolina, October 16
-
Yu, E., Cysneiros, L. Designing for Privacy and Other Competing Requirements. 2nd Symposium on Requirements Engineering for Information Security (SREIS'02). Raleigh, North Carolina, October 16, 2002.
-
(2002)
2nd Symposium on Requirements Engineering for Information Security (SREIS'02).
-
-
Yu, E.1
Cysneiros, L.2
-
14
-
-
84942921136
-
Modeling Trust for System Design Using the i Strategic Actors Framework
-
R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer
-
Yu, E. and Liu, L. Modeling Trust for System Design Using the i Strategic Actors Framework. In: Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer, 2001. pp.175-194.
-
(2001)
Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives.
, pp. 175-194
-
-
Yu, E.1
Liu, L.2
-
15
-
-
84956854380
-
Modeling Strategic Actor Relationships to Support Intellectual Property Management
-
Yokohama, Japan, November 27-30,2001. LNCS 2224 Spring Verlag
-
Yu, E., Liu, L., Li, Y. Modeling Strategic Actor Relationships to Support Intellectual Property Management. 20th International Conference on Conceptual Modeling (ER-2001). Yokohama, Japan, November 27-30,2001. LNCS 2224 Spring Verlag, pp. 164-178.
-
20th International Conference on Conceptual Modeling (ER-2001).
, pp. 164-178
-
-
Yu, E.1
Liu, L.2
Li, Y.3
|