-
2
-
-
70349663423
-
-
C. Feltus, A. Rifaut, An Ontology for Requirements Analysis of Managers' Policies in Financial Institutions, I-ESA2007, Madeira, Portugal.
-
C. Feltus, A. Rifaut, An Ontology for Requirements Analysis of Managers' Policies in Financial Institutions, I-ESA2007, Madeira, Portugal.
-
-
-
-
3
-
-
0242709332
-
-
A, June, Monterey, California, USA
-
Gustaf Neumann, Mark Strembeck, A Scenario-driven Role Engineering Process for Functional RBAC Roles, SACMAT'02, June 34, 2002, Monterey, California, USA.
-
(2002)
Scenario-driven Role Engineering Process for Functional RBAC Roles, SACMAT'02
-
-
Neumann, G.1
Strembeck, M.2
-
5
-
-
0001809810
-
-
Bristol, Springer-Verlag
-
N. Damianou, N. Dulay, E. Lupu, M. Sloman , The Ponder Policy Specification Language Workshop on Policies for Distributed Systems and Networks (Policy2001), HP Labs Bristol, 29-31. Springer-Verlag.
-
The Ponder Policy Specification Language Workshop on Policies for Distributed Systems and Networks (Policy2001), HP Labs
, pp. 29-31
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
6
-
-
33745008627
-
-
Bertino, E., Mileo, A., and Provetti, A. 2005. PDL with Preferences. IEEE international Workshop on Policies For Distributed Systems and Networks, Policy 2005 - 00, IEEE Computer Society, Washington, DC, 213-222.
-
Bertino, E., Mileo, A., and Provetti, A. 2005. PDL with Preferences. IEEE international Workshop on Policies For Distributed Systems and Networks, Policy 2005 - Vol. 00, IEEE Computer Society, Washington, DC, 213-222.
-
-
-
-
7
-
-
34748905890
-
-
Basile, C.; Lioy, A.; Perez, G. Martinez; C., F. J. Garcia; Skarmeta, A. F. Gomez, POSITIF: A Policy-Based Security Management SystemPolicies for Distributed Systems and Networks, 2007. POLICY'07, pp. 280 - 280.
-
Basile, C.; Lioy, A.; Perez, G. Martinez; C., F. J. Garcia; Skarmeta, A. F. Gomez, POSITIF: A Policy-Based Security Management SystemPolicies for Distributed Systems and Networks, 2007. POLICY'07, pp. 280 - 280.
-
-
-
-
9
-
-
84989095980
-
Redirecting Research in Business Policy and Strategy
-
Jan, Mar
-
Colin Camerer, Redirecting Research in Business Policy and Strategy, Strategic Management Journal, Vol.6, No. 1. (Jan. - Mar., 1985), pp. 1-15.
-
(1985)
Strategic Management Journal
, vol.6
, Issue.1
, pp. 1-15
-
-
Camerer, C.1
-
10
-
-
0038064758
-
Using a Classification of Management Policies for Policy Specification and Policy Transformation
-
95, Santa Barbara, California, May
-
René Wies, Using a Classification of Management Policies for Policy Specification and Policy Transformation. In Proc. ISINM '95, Santa Barbara, California, May 1995.
-
(1995)
Proc. ISINM
-
-
Wies, R.1
-
11
-
-
70349658925
-
-
André Rifaut, Christophe Feltus, Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach, REMO2V'2006, Luxembourg.
-
André Rifaut, Christophe Feltus, Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach, REMO2V'2006, Luxembourg.
-
-
-
-
13
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
August
-
David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli, Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, Pages 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Richard Kuhn, D.4
Chandramouli, R.5
-
14
-
-
1142309815
-
Provisions and Obligations in Policy Management and Security Applications
-
China
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera, Provisions and Obligations in Policy Management and Security Applications, 28th VLDB conference, China, 2002.
-
(2002)
28th VLDB conference
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
15
-
-
0141733117
-
Modelling access policies using roles in requirements engineering
-
Robert Crook, Darrel Ince, Bashar Nuseibeh, Modelling access policies using roles in requirements engineering, Information and Software Technology 45 (2003) 979-991.
-
(2003)
Information and Software Technology
, vol.45
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
16
-
-
32044457421
-
Using Trust Assumptions with Security Requirements
-
April
-
Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, and Bashar Nuseibeh, Using Trust Assumptions with Security Requirements, Requirements Engineering Journal, vol. 11 no. 2 (April 2006) pp. 138-15.
-
(2006)
Requirements Engineering Journal
, vol.11
, Issue.2
, pp. 138-215
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
18
-
-
70349658018
-
-
Pete A. Epstein, Engineering of Role/Permission Assignement, PhD thesis
-
Pete A. Epstein, Engineering of Role/Permission Assignement, PhD thesis.
-
-
-
-
19
-
-
49149095249
-
Using i* to Model Access Policies: Relating Roles to their Organisational Context
-
Giorgini, P, Maiden, N, Mylopoulos, J, and Yu, E, eds, MIT Press
-
Crook, R., Ince, D., and Nuseibeh, B., "Using i* to Model Access Policies: Relating Roles to their Organisational Context", Social Modelling for Requirements Engineering, Giorgini, P., Maiden, N., Mylopoulos, J., and Yu, E., eds., MIT Press, 2006.
-
(2006)
Social Modelling for Requirements Engineering
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
21
-
-
70349655812
-
-
Yu, E. S. and Liu, L. 2001. Modelling Trust for System Design Using the i* Strategic Actors Framework. Workshop on Deception, Fraud, and Trust in Agent Societies Held During the Autonomous, Eds. Lecture 35 194.
-
Yu, E. S. and Liu, L. 2001. Modelling Trust for System Design Using the i* Strategic Actors Framework. Workshop on Deception, Fraud, and Trust in Agent Societies Held During the Autonomous, Eds. Lecture 35 194.
-
-
-
-
22
-
-
1142293423
-
-
Raleigh, North Carolina
-
L. Liu, E. Yu, J. Mylopoulos, Analyzing Security Requirements as Relationships Among Strategic Actors, SREIS'02, Raleigh, North Carolina, 2002.
-
(2002)
Analyzing Security Requirements as Relationships Among Strategic Actors, SREIS'02
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
23
-
-
70349677109
-
-
Antón, Goal-Based Requirements Analysi,. Second ICRE'96, Colorado Springs, USA, 1996.
-
Antón, Goal-Based Requirements Analysi,. Second ICRE'96, Colorado Springs, USA, 1996.
-
-
-
-
24
-
-
49149089887
-
-
UK
-
Robert Crook, Darrel Ince, Bashar Nuseibeh, Towards an Analytical Role Modelling Framework for Security Requirements, Security Requirements Group, Departement of Computing, The Open University, Walton Hall, Milton Keynes, MK7 6AA, UK.
-
Towards an Analytical Role Modelling Framework for Security Requirements, Security Requirements Group, Departement of Computing, The Open University, Walton Hall, Milton Keynes, MK7
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
26
-
-
49149093949
-
A Framework for Privacy-Enhanced Access Control Analysis in Requirements Engineering
-
Klagenfurt/Velden, Austria, June 16-17
-
Qingfeng He, Annies I. Antón, "A Framework for Privacy-Enhanced Access Control Analysis in Requirements Engineering", Proc. of the 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03), pp. 137-146, Klagenfurt/Velden, Austria, June 16-17, 2003.
-
(2003)
Proc. of the 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03)
, pp. 137-146
-
-
He, Q.1
Antón, A.I.2
-
28
-
-
0033646113
-
-
Roeckle, H., Schimpf, G., and Weidinger, R. 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control (Berlin, Germany, July 26 - 28, 2000). Role-Based Access Control '00.
-
Roeckle, H., Schimpf, G., and Weidinger, R. 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control (Berlin, Germany, July 26 - 28, 2000). Role-Based Access Control '00.
-
-
-
-
29
-
-
84949201378
-
A Framework for Multiple Authorization Types in a Healthcare Application System
-
ACSAC. IEEE Computer Society, Washington, DC
-
Chandramouli, R. 2001. A Framework for Multiple Authorization Types in a Healthcare Application System. 17th Annual Computer Security Applications Conference, 2001. ACSAC. IEEE Computer Society, Washington, DC, 137.
-
(2001)
17th Annual Computer Security Applications Conference
, pp. 137
-
-
Chandramouli, R.1
-
31
-
-
84888773622
-
A Policy Deployment Model for the Ponder Language
-
Seattle, May, IEEE Press
-
N. Dulay, E. Lupu, M. Solman, N. Damianou, A Policy Deployment Model for the Ponder Language , An extended version of paper in Proc. IEEE/IFIP International Symposium on Integrated Network Management, (IM'2001), Seattle, May 2001, IEEE Press.
-
(2001)
An extended version of paper in Proc. IEEE/IFIP International Symposium on Integrated Network Management, (IM'2001)
-
-
Dulay, N.1
Lupu, E.2
Solman, M.3
Damianou, N.4
-
32
-
-
70349652734
-
-
OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0 February 2005
-
OASIS, "eXtensible Access Control Markup Language (XACML) Version 2.0" February 2005. www.oasis-open.org/committees/xacml/
-
-
-
-
35
-
-
0004130023
-
-
Jossey-Baas, San Francisco
-
Gray, B. Collaborating. Jossey-Baas, San Francisco, 1991.
-
(1991)
Collaborating
-
-
Gray, B.1
-
36
-
-
49149111899
-
An Innovative Business-Oriented Approach for a Distributed Access Management
-
SIM, Damascus, Syria
-
J. Aubert, B. Gateau, C. Incoul, C. Feltus, SIM : An Innovative Business-Oriented Approach for a Distributed Access Management, International Conference on Information & Communication Technologies: from Theory to Applications (IEEE ICTTA2008), Damascus, Syria.
-
International Conference on Information & Communication Technologies: From Theory to Applications (IEEE ICTTA2008)
-
-
Aubert, J.1
Gateau, B.2
Incoul, C.3
Feltus, C.4
-
37
-
-
70349674957
-
-
http://plato.stanford.edu/entries/logic-deontic
-
-
-
-
38
-
-
0003344550
-
The Role of Deontic Logic in the Specification of Information Systems
-
Logics for databases and information systems book contents, Kluwer, pp
-
J.-J. Ch. Meyer, R.J. Wieringa, F.P.M. Dignum, The Role of Deontic Logic in the Specification of Information Systems, International Series In Engineering And Computer Science archive, Logics for databases and information systems book contents, Kluwer, pp. 71-115, 1998.
-
(1998)
International Series In Engineering And Computer Science archive
, pp. 71-115
-
-
Meyer, J.-J.C.1
Wieringa, R.J.2
Dignum, F.P.M.3
-
39
-
-
70349695623
-
-
C. Feltus, Preliminary Literature Review of Policy Engineering Methods- Toward Responsibility Concept, ICTTA2008, Damascus, Syria.
-
C. Feltus, Preliminary Literature Review of Policy Engineering Methods- Toward Responsibility Concept, ICTTA2008, Damascus, Syria.
-
-
-
-
40
-
-
70349666472
-
-
International Standard for Corporate Governance of IT IT Governance, ISO/IEC 38500
-
International Standard for Corporate Governance of IT (IT Governance) - ISO/IEC 38500, 2008
-
(2008)
-
-
-
42
-
-
0347931754
-
Exploring the relevance of the personal and social responsibility model in adapted physical activity: A collective case study
-
[42] P.M Wright, K. White, D. Gaebler-Spira (2004). Exploring the relevance of the personal and social responsibility model in adapted physical activity: A collective case study. Journal of Teaching in Physical Education, 23(1), 71-87.
-
(2004)
Journal of Teaching in Physical Education
, vol.23
, Issue.1
, pp. 71-87
-
-
Wright, P.M.1
White, K.2
Gaebler-Spira, D.3
-
43
-
-
70349658012
-
Multi-Agents based Architecture for IS Security Incident Reaction
-
Vietnam
-
B. Gâteau, D. Khadraoui, C. Feltus, B. de Rémont, Multi-Agents based Architecture for IS Security Incident Reaction, 6th IEEE International Conference on Computer Science, 2008 IEEE International Conference on Research, Innovation & Vision for the Future (IEEE RIVF 2008), 14-16/7/2008, Ho Chi Minh City, Vietnam.
-
6th IEEE International Conference on Computer Science, 2008 IEEE International Conference on Research, Innovation & Vision for the Future (IEEE RIVF 2008), 14-16/7/2008, Ho Chi Minh City
-
-
Gâteau, B.1
Khadraoui, D.2
Feltus, C.3
de Rémont, B.4
|