-
1
-
-
49049095379
-
An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in Grid-Based Virtual Organisations
-
IEEE
-
G. Dallons, P. Massonet, J. F. Molderez, C. Ponsard, and A. E. Arenas. An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in Grid-Based Virtual Organisations. In International Workshop on Security, Trust and Privacy in Grid Systems, Grid-STP 2007. IEEE, 2007.
-
(2007)
International Workshop on Security, Trust and Privacy in Grid Systems, Grid-STP 2007
-
-
Dallons, G.1
Massonet, P.2
Molderez, J.F.3
Ponsard, C.4
Arenas, A.E.5
-
2
-
-
15744398074
-
Specifying and Analyzing Early Requirements in Tropos
-
A. Fuxman, L. Liu, J. Mylopoulos, M. Pistore, M. Roveri, and P. Traverso. Specifying and Analyzing Early Requirements in Tropos. Requirements Eng., 9(2): 132-150, 2004.
-
(2004)
Requirements Eng
, vol.9
, Issue.2
, pp. 132-150
-
-
Fuxman, A.1
Liu, L.2
Mylopoulos, J.3
Pistore, M.4
Roveri, M.5
Traverso, P.6
-
3
-
-
51349098336
-
Design Patterns for Secure Virtual Organization Management Architecture
-
IEEE
-
A. Gaeta, M. Gaeta, I. Djordjevic, A. Smith, T. Dimitrakos, M. Colombo, and S. Miranda. Design Patterns for Secure Virtual Organization Management Architecture. In International Workshop on Security, Trust and Privacy in Grid Systems, Grid-STP 2007. IEEE, 2007.
-
(2007)
International Workshop on Security, Trust and Privacy in Grid Systems, Grid-STP 2007
-
-
Gaeta, A.1
Gaeta, M.2
Djordjevic, I.3
Smith, A.4
Dimitrakos, T.5
Colombo, M.6
Miranda, S.7
-
4
-
-
33749035450
-
Requirements Engineering for Trust Management: Model, Methodology, and Reasoning
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Requirements Engineering for Trust Management: Model, Methodology, and Reasoning. Journal of Information Security, 5(4):257-274, 2006.
-
(2006)
Journal of Information Security
, vol.5
, Issue.4
, pp. 257-274
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
5
-
-
49049106399
-
Grid Single Sign-On in CCLRC
-
Nottingham, UK, Sept
-
J. Jensen, D. Spence, and M. Viljoen. Grid Single Sign-On in CCLRC. In Proceedings of the UK e-Science All Hands Meeting 2006 (AHM2006), Nottingham, UK, Sept. 2006.
-
(2006)
Proceedings of the UK e-Science All Hands Meeting 2006 (AHM2006)
-
-
Jensen, J.1
Spence, D.2
Viljoen, M.3
-
7
-
-
49049085738
-
Threat Analysis and Attacks on XtreemOS: A Grid-Enabled Operating System
-
Springer
-
A. D. Lakhani, E. Yang, B. Matthews, I. Johnson, S. Naqvi, and G. C. Silaghi. Threat Analysis and Attacks on XtreemOS: A Grid-Enabled Operating System. In Toward Next Generation Grids, Proceedings of the CoreGRID Symposium 2007. Springer, 2007.
-
(2007)
Toward Next Generation Grids, Proceedings of the CoreGRID Symposium 2007
-
-
Lakhani, A.D.1
Yang, E.2
Matthews, B.3
Johnson, I.4
Naqvi, S.5
Silaghi, G.C.6
-
9
-
-
34247145578
-
Early Verification and Validation of Mission Critical Systems
-
C. Ponsard, P. Massonet, J. F. Molderez, A. Rifaut, A. van Lamsweerde, and H. T. Van. Early Verification and Validation of Mission Critical Systems. Journal of Formal Methods in System Design, 30(3), 2007.
-
(2007)
Journal of Formal Methods in System Design
, vol.30
, Issue.3
-
-
Ponsard, C.1
Massonet, P.2
Molderez, J.F.3
Rifaut, A.4
van Lamsweerde, A.5
Van, H.T.6
-
10
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
G. Sindre and A. L. Opdahl. Eliciting Security Requirements with Misuse Cases. Requirements Engineering, 10(1):34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
14
-
-
49049107998
-
-
XtreemOS. XtreemOS Deliverable D3.5.2: Security Requirements for a Grid-based OS, 2007.
-
XtreemOS. XtreemOS Deliverable D3.5.2: Security Requirements for a Grid-based OS, 2007.
-
-
-
|