-
3
-
-
64849116313
-
-
Michael, J. B., Hestad, D.R., Pedersen, C.M., Gaines L.T (2002). Incorporating the Human Element of Trust into Information Systems.IAnewsletter 5: 4-8.
-
Michael, J. B., Hestad, D.R., Pedersen, C.M., Gaines L.T (2002). "Incorporating the Human Element of Trust into Information Systems."IAnewsletter 5: 4-8.
-
-
-
-
4
-
-
85022739470
-
Calculativeness, Trust, and Economic Organization
-
Williamson, O. (1993) Calculativeness, Trust, and Economic Organization. Journal of Law and Economics, 34, 453 502.
-
(1993)
Journal of Law and Economics
, vol.34
, pp. 453-502
-
-
Williamson, O.1
-
5
-
-
64849105157
-
-
Almenarez, F., Marin, A., Campo, C., Garc1a C (2004 ). PTM: A Pervasive Trust Management Model for Dynamic Open Environments. . First Workshop on Pervasive Security, Privacy and Trust, PSPT'04 in conjunction with Mobiquitous., Boston, USA.
-
Almenarez, F., Marin, A., Campo, C., Garc1a C (2004 ). PTM: A Pervasive Trust Management Model for Dynamic Open Environments. . First Workshop on Pervasive Security, Privacy and Trust, PSPT'04 in conjunction with Mobiquitous., Boston, USA.
-
-
-
-
6
-
-
64849088554
-
Building Trust in Partnerships Between Community Orgnization and Government
-
Melbourne
-
Alford, J. (2004). Building Trust in Partnerships Between Community Orgnization and Government.. Changing the Way Government Works Seminar, Melbourne.
-
(2004)
Changing the Way Government Works Seminar
-
-
Alford, J.1
-
7
-
-
64849092874
-
A Hybrid Trust Management Model For MAS Based
-
Faculty of Computer Science and Information System University of Technology Malaysia, Skudai, Johor
-
Maarof, M. A., Krishna, K (2002). "A Hybrid Trust Management Model For MAS Based. Information Security Group, Faculty of Computer Science and Information System University of Technology Malaysia, 81310 Skudai, Johor."
-
(2002)
Information Security Group
, pp. 81310
-
-
Maarof, M.A.1
Krishna, K.2
-
8
-
-
0030351690
-
Trust and Breach of the Psychological Contract
-
Robinson, S. L. (1996). "Trust and Breach of the Psychological Contract.. "Administrative Science Quarterly 41: 574-579.
-
(1996)
Administrative Science Quarterly
, vol.41
, pp. 574-579
-
-
Robinson, S.L.1
-
9
-
-
84899405437
-
Modelling Security and Trust with Secure Tropos
-
Idea Group
-
Giorgini, P., Mouratidis, H., Zannone, Z (2006). Modelling Security and Trust with Secure Tropos. In Integrating Security and Software Engineering: Advances and Future Vision, Idea Group: 160-189.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 160-189
-
-
Giorgini, P.1
Mouratidis, H.2
Zannone, Z.3
-
10
-
-
3142750497
-
Tropos: An Agent-Oriented Software Development Methodology
-
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos. J. (2004): Tropos: An Agent-Oriented Software Development Methodology. Autonomous Agents and Multi-Agent Systems 8(3): 203-236
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
12
-
-
64849092340
-
-
Wilson, M, Arenas, A, Schubert, L, Ed, TrustCoM Framework
-
Wilson, M., Arenas, A., Schubert, L, Ed. (2007). TrustCoM Framework V4. AL1 - TrustCoM Framework.
-
(2007)
TrustCoM Framework V4
-
-
-
13
-
-
64849104591
-
Developing Security-Critical Applications with UMLsec. A Short Walk-Through
-
Jürjens, J. (2004). "Developing Security-Critical Applications with UMLsec. A Short Walk-Through." The European Journal for the Informatics Professional 5(2).
-
(2004)
The European Journal for the Informatics Professional
, vol.5
, Issue.2
-
-
Jürjens, J.1
-
14
-
-
64849106913
-
-
Basin, D., Clavel, M., Doser, J, Egea, M (2007). A Metamodel-Based Approach for Analyzing Security-Design Models. MODELS 2007, Nashville, TN.
-
Basin, D., Clavel, M., Doser, J, Egea, M (2007). A Metamodel-Based Approach for Analyzing Security-Design Models. MODELS 2007, Nashville, TN.
-
-
-
-
15
-
-
23944475544
-
When Security meets Software Engineering: A case of modelling secure information systems, in the Information System
-
Mouratidis, H., Giorgini, P., Manson, G (2005). "When Security meets Software Engineering: A case of modelling secure information systems, in the Information System." Elsevier 30(8): 609-629.
-
(2005)
Elsevier
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
16
-
-
22144453559
-
Model based Security Risk Analysis for Web Applications: The CORAS approach
-
Oxford, UK
-
Dimitrakos, T., Ritchie, B., Raptis, D., Stoølen, K (2002). Model based Security Risk Analysis for Web Applications: The CORAS approach. EuroWeb 2002 Conference, Oxford, UK.
-
(2002)
EuroWeb 2002 Conference
-
-
Dimitrakos, T.1
Ritchie, B.2
Raptis, D.3
Stoølen, K.4
-
17
-
-
64849107066
-
Trust Ontology for Information Systems Development
-
Ireland, Galway
-
Bimrah, K., Mouratidis, H., Preston, D (2007). Trust Ontology for Information Systems Development.. 16th International Conference on Information Systems Development Ireland, Galway.
-
(2007)
16th International Conference on Information Systems Development
-
-
Bimrah, K.1
Mouratidis, H.2
Preston, D.3
-
18
-
-
26844545857
-
Towards an Ontology of Trust
-
Copenhagen, Denmark, Springer Berlin, He6idelberg
-
Viljanen, L. (2005). Towards an Ontology of Trust. Lecture Notes in Computer Science. Copenhagen, Denmark, Springer Berlin / He6idelberg.
-
(2005)
Lecture Notes in Computer Science
-
-
Viljanen, L.1
-
19
-
-
33646699357
-
-
Cyprus, Springer-Verlag Berlin, Heidelberg
-
Kim, A., Luo, J. & Kang, M (2005). Security Ontology for Annotating Resources. Lecture Notes in Computer Science, Agai Napa, Cyprus, Springer-Verlag Berlin / Heidelberg.
-
(2005)
Security Ontology for Annotating Resources. Lecture Notes in Computer Science. Agai Napa
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
20
-
-
84898489356
-
Towards Formal Ontologies for Technology Risk Measurement in the Banking Industry
-
Verona, Italy
-
Cuske, C., Korthaus, A., Seedorf, S., Tomczyk, P (2005). Towards Formal Ontologies for Technology Risk Measurement in the Banking Industry. Proceedings of the 1st Workshop Formal Ontologies Meet Industry, Verona, Italy.
-
(2005)
Proceedings of the 1st Workshop Formal Ontologies Meet Industry
-
-
Cuske, C.1
Korthaus, A.2
Seedorf, S.3
Tomczyk, P.4
-
21
-
-
64849112553
-
-
Simmonds, A., Sandilands, P., Ekert, L.V (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, Kathmandu, Nepal, Springer Berlin / Heidelberg
-
Simmonds, A., Sandilands, P., Ekert, L.V (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, Kathmandu, Nepal, Springer Berlin / Heidelberg
-
-
-
-
24
-
-
33750062647
-
An Ontology for Modelling Security: The Tropos Approach
-
Oxford, England
-
Mouratidis, H., Giorgini, P., Mansoon, G (2003). An Ontology for Modelling Security: The Tropos Approach. Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information & Engineering Systems, Oxford, England.
-
(2003)
Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information & Engineering Systems
-
-
Mouratidis, H.1
Giorgini, P.2
Mansoon, G.3
|