-
1
-
-
0242674432
-
Hippocratic databases
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proc. of VLDB'02, pages 143-154, 2002.
-
(2002)
Proc. of VLDB'02
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
70449402424
-
Secure and dependable patterns in organizations: An empirical approach
-
IEEE Press
-
Y. Asnar, R. Bonato, P. Giorgini, F. Massacci, V. Meduri, C. Riccucci, , and A. Saidane. Secure and dependable patterns in organizations: An empirical approach. In Proc. of RE'07. IEEE Press, 2007.
-
(2007)
Proc. of RE'07
-
-
Asnar, Y.1
Bonato, R.2
Giorgini, P.3
Massacci, F.4
Meduri, V.5
Riccucci, C.6
Saidane, A.7
-
4
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
T. Breaux and A. Anton. Analyzing regulatory rules for privacy and security requirements. TSE, 34(1):5-20, 2008.
-
(2008)
TSE
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.1
Anton, A.2
-
5
-
-
77953005868
-
A distributed requirements management framework for legal compliance and accountability
-
To appear
-
T. Breaux, A. Anton, and E. Spafford. A distributed requirements management framework for legal compliance and accountability. Comp. & Sec., 2007. To appear.
-
(2007)
Comp. & Sec.
-
-
Breaux, T.1
Anton, A.2
Spafford, E.3
-
6
-
-
34548045316
-
How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
-
L. Compagna, P. E. Khoury, F. Massacci, R. Thomas, and N. Zannone. How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In Proc. of ICAIL '07, 2007.
-
Proc. of ICAIL '07, 2007
-
-
Compagna, L.1
Khoury, P.E.2
Massacci, F.3
Thomas, R.4
Zannone, N.5
-
8
-
-
33749035450
-
Requirements engineering for trust management: Model, methodology, and reasoning
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Requirements engineering for trust management: Model, methodology, and reasoning. IJIS, 5(4):257-274, 2006.
-
(2006)
IJIS
, vol.5
, Issue.4
, pp. 257-274
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
9
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation
-
F. Massacci, M. Prest, and N. Zannone. Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation. Comp. Standards&Interfaces, 27(5):445-455, 2005.
-
(2005)
Comp. Standards&Interfaces
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
10
-
-
77952994638
-
Security patterns meet agent oriented software engineering: A complementary solution for developing security information systems
-
H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In Proc. of ER'05, 2005.
-
Proc. of ER'05, 2005
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
11
-
-
84884396139
-
The Role of Logic in Computational Models of Legal Argument: A Critical Survey
-
Computational Logic: Logic Programming and Beyond, Springer-Verlag
-
H. Prakken and G. Sartor. The Role of Logic in Computational Models of Legal Argument: A Critical Survey. In Computational Logic: Logic Programming and Beyond, volume 2408 of LNCS, pages 342-381. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2408
, pp. 342-381
-
-
Prakken, H.1
Sartor, G.2
-
15
-
-
33750069781
-
Architectural Patterns for Enabling Application Security
-
J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In Proc. of PLoP'97, 1997.
-
Proc. of PLoP'97, 1997
-
-
Yoder, J.1
Barcalow, J.2
-
16
-
-
70349240293
-
Enforcing a security pattern in stake-holder goal models
-
ACM
-
Y. Yu, H. Kaiya, H. Washizaki, Y. Xiong, Z. Hu, and N. Yoshioka. Enforcing a security pattern in stake-holder goal models. In Proc. of QoP '08, pages 9-14. ACM, 2008.
-
(2008)
Proc. of QoP '08
, pp. 9-14
-
-
Yu, Y.1
Kaiya, H.2
Washizaki, H.3
Xiong, Y.4
Hu, Z.5
Yoshioka, N.6
|