-
1
-
-
27644498532
-
Enabling shared audit data
-
Springer-Verlag October
-
Baldwin, A., Shiu, S. Enabling shared audit data. International Journal of Information Security. Springer-Verlag. Volume 4, Number 4. pp. 263 - 276. October 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.4
, pp. 263-276
-
-
Baldwin, A.1
Shiu, S.2
-
5
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
Rolland C, Bodat F. and Cauvert C. (eds) Berlin: Springer Verlag. Paris
-
Chung L. Dealing with Security Requirements during the development of Information Systems. In: Rolland C, Bodat F. and Cauvert C. (eds). Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93. Berlin: Springer Verlag. Paris. pp. 234-251.
-
Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93
, pp. 234-251
-
-
Chung, L.1
-
6
-
-
0005914572
-
-
CMMI. CAPABILITY MATURITY MODEL INTEGRATION, VERSION 1.1 CMU/SEI-2002-TR-028. Carnegie Mellon. Software Engineering Institute. August
-
CMMI. CAPABILITY MATURITY MODEL INTEGRATION, VERSION 1.1. Technical Report. CMU/SEI-2002-TR-028. Carnegie Mellon. Software Engineering Institute. August.
-
Technical Report
-
-
-
8
-
-
77954141559
-
-
Directive 95/46/CE of the European Parliament and Council, dated October 24th: about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031-0050
-
Directive 95/46/CE of the European Parliament and Council, dated October 24th: about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031-0050.
-
-
-
-
9
-
-
77954129948
-
-
Directive 2002/58/CE, of the European Parliament and Council, of July 12, 2002, relative to the processing of personal data and the protection of privacy in the electronic communications industry (Official Gazette of the European Union L 201 of 31.7.2002)
-
Directive 2002/58/CE, of the European Parliament and Council, of July 12, 2002, relative to the processing of personal data and the protection of privacy in the electronic communications industry (Official Gazette of the European Union L 201 of 31.7.2002).
-
-
-
-
10
-
-
0034908189
-
Clinical audit in NHS acute and community trusts: A comparative analysis
-
Dowie, R., Kennedy, A. Clinical audit in NHS acute and community trusts: a comparative analysis. British Journal of Clinical Governance, Volume 6, Number 2 (2001), pp. 94-101.
-
(2001)
British Journal of Clinical Governance
, vol.6
, Issue.2
, pp. 94-101
-
-
Dowie, R.1
Kennedy, A.2
-
11
-
-
4944265018
-
Data protection and data sharing in telematics
-
December
-
Duri, S., Elliott, J., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J. Data Protection and Data Sharing in Telematics. Mobile Networks and Applications. Volume 9, Issue 6. Pages: 693-701. December, 2004.
-
(2004)
Mobile Networks and Applications
, vol.9
, Issue.6
, pp. 693-701
-
-
Duri, S.1
Elliott, J.2
Gruteser, M.3
Liu, X.4
Moskowitz, P.5
Perez, R.6
Singh, M.7
Tang, J.8
-
13
-
-
2942757657
-
Engineering security requirements
-
Swiss Federal Institute of Technology (ETH), Zurich, Switzerland January/February
-
Firesmith, D. Engineering Security Requirements. Journal of Object Technology (JOT), 2(1), Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, pp. 53-68, January/February 2003.
-
(2003)
Journal of Object Technology (JOT)
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.1
-
14
-
-
20944436409
-
Is audit research? The relationships between clinical audit and social research
-
April
-
Hughes, R. Is audit research? The relationships between clinical audit and social research. International Journal of Health Care Quality Assurance, Volume 18, Number 4 (April 2005), pp. 289-299.
-
(2005)
International Journal of Health Care Quality Assurance
, vol.18
, Issue.4
, pp. 289-299
-
-
Hughes, R.1
-
20
-
-
38949099012
-
The roles of policy and professionalism in the protection of processed clinical data: A literature review
-
Lusignan, S., Chan, T., Theadom, A., Dhoul, N. (2006) The roles of policy and professionalism in the protection of processed clinical data: A literature review. International Journal of Medical Informatics.
-
(2006)
International Journal of Medical Informatics
-
-
Lusignan, S.1
Chan, T.2
Theadom, A.3
Dhoul, N.4
-
21
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation
-
Massacci, F., Prest, M., Zannone, N. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27 (2005) 445-455.
-
(2005)
Computer Standards & Interfaces
, vol.27
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
22
-
-
77954108103
-
-
Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December 2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data
-
Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December 2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data.
-
-
-
-
23
-
-
0002779304
-
Privacy, information technology, and health care
-
August
-
Rindfleisch, T. Privacy, Information Technology, and Health Care. Communications of the ACM. Volume 40, Issue 8. Pages: 92-100. August, 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.8
, pp. 92-100
-
-
Rindfleisch, T.1
-
24
-
-
0000052619
-
Authentication. Access control and audit
-
March ISBN: 0360-0300
-
Sandhu, R., Samarati, P. Authentication. Access Control and Audit. ACM Computing Surveys (CSUR). Volume 28, Issue 1. Pages: 241-243. March, 1996. ISBN: 0360-0300.
-
(1996)
ACM Computing Surveys (CSUR)
, vol.28
, Issue.1
, pp. 241-243
-
-
Sandhu, R.1
Samarati, P.2
-
25
-
-
2342563770
-
Grand challenges in information security: Process and output
-
Smith, S. W. and Spafford, E. H. (2004) Grand Challenges in Information Security: Process and Output, IEEE Security & Privacy, 2, 69-71.
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 69-71
-
-
Smith, S.W.1
Spafford, E.H.2
-
27
-
-
77954133417
-
-
Spanish Constitutional Law 15/1999, December 13th, on 14/12 (In Spanish)
-
Spanish Constitutional Law 15/1999, December 13th, on Personal Data Protection. BOE no. 298, 14/12/1999 (In Spanish).
-
(1999)
Personal Data Protection. BOE No. 298
-
-
-
29
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
Toval, A., Nicolás, J., Moros, B., Baidez, F. Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. Requirements Engineering Journal (2002) 6:205-219.
-
(2002)
Requirements Engineering Journal
, vol.6
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
Baidez, F.4
-
30
-
-
27644567989
-
Legal requirements reuse: A critical success factor for requirements quality and personal data protection
-
September
-
Toval, A., Olmos, A., Piattini, M. Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection. Proceedings of the IEEE Joint International Conference on Requirements Engineering (ICRE'02 and RE'02), pp: 9-13, September 2002.
-
(2002)
Proceedings of the IEEE Joint International Conference on Requirements Engineering (ICRE'02 and RE'02)
, pp. 9-13
-
-
Toval, A.1
Olmos, A.2
Piattini, M.3
-
31
-
-
0043067952
-
Data security and protection in cross-institutional electronic patient records
-
Van der Haak, M., Wolff, A., Brandner, R., Drings, P., Wannenmacher, M., Wetter, Th. Data security and protection in cross-institutional electronic patient records. International Journal of Medical Informatics (2003) 70, 117-130.
-
(2003)
International Journal of Medical Informatics
, vol.70
, pp. 117-130
-
-
Van Der Haak, M.1
Wolff, A.2
Brandner, R.3
Drings, P.4
Wannenmacher, M.5
Wetter, T.H.6
|