-
3
-
-
84982790262
-
Distinguishing action research from participative case studies
-
March
-
R. Baskerville. Distinguishing action research from participative case studies. J. of Syst. and Info. Techn., 1(1):25-45, March 1997.
-
(1997)
J. of Syst. and Info. Techn.
, vol.1
, Issue.1
, pp. 25-45
-
-
Baskerville, R.1
-
5
-
-
78650382212
-
-
British Government's Central Computer and Telecommunications Agency
-
British Government's Central Computer and Telecommunications Agency. CRAMM: Risk Analysis and Management methodology, 2008.
-
(2008)
CRAMM: Risk Analysis and Management Methodology
-
-
-
6
-
-
0003765587
-
-
ISO 15408, Version 3.1, Revision 2, CCMB- 2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB- 2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007.
-
2007 Common Criteria for Information Technology Security Evaluation
-
-
-
7
-
-
0027574423
-
Goaldirected requirements acquisition
-
A. Dardenne, A. van Lamsweerde, and S. Fickas. Goaldirected requirements acquisition. Sci. Comput. Program., 20(1-2):3-50, 1993.
-
(1993)
Sci. Comput. Program.
, vol.20
, Issue.1-2
, pp. 3-50
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
8
-
-
34347372090
-
A probabilistic model for optimal insurance contracts against security risks and privacy violation in it outsourcing environments
-
S. Gritzalis, A. Yannacopoulos, C. Lambrinoudakis, P. Hatzopoulos, and S.K.Katsikas. A probabilistic model for optimal insurance contracts against security risks and privacy violation in it outsourcing environments. Int. Journal of Information Security, 6(4):197-211, 2007.
-
(2007)
Int. Journal of Information Security
, vol.6
, Issue.4
, pp. 197-211
-
-
Gritzalis, S.1
Yannacopoulos, A.2
Lambrinoudakis, C.3
Hatzopoulos, P.4
Katsikas, S.K.5
-
9
-
-
32044457421
-
Using trust assumptions with security requirements
-
B. Haley, C. Laney, D. Moffett, and B. Nuseibeh. Using trust assumptions with security requirements. Requir. Eng., 11(2):138-151, 2006.
-
(2006)
Requir. Eng.
, vol.11
, Issue.2
, pp. 138-151
-
-
Haley, B.1
Laney, C.2
Moffett, D.3
Nuseibeh, B.4
-
10
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
C. Haley, R. Laney, J. Moffett, and B. Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng., 34(1):133-153, 2008.
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
11
-
-
49249117338
-
Managing risk propagation in extended enterprise networks
-
C. Huang, R. Behara, and Q. Hu. Managing Risk Propagation in Extended Enterprise Networks. IT Professional, 10(4):14-19, 2008.
-
(2008)
IT Professional
, vol.10
, Issue.4
, pp. 14-19
-
-
Huang, C.1
Behara, R.2
Hu, Q.3
-
12
-
-
59049093084
-
Rescuing it outsourcing: Strategic use of service-level agreements
-
C. Huang and J. Goo. Rescuing IT Outsourcing: Strategic Use of Service-Level Agreements. IT Prof., 11(1):50-58, 2009.
-
(2009)
IT Prof.
, vol.11
, Issue.1
, pp. 50-58
-
-
Huang, C.1
Goo, J.2
-
14
-
-
34250776507
-
Security and trust in it business outsourcing: A manifesto
-
Proc. of the 2nd Int. Workshop on Security and Trust Management (STM 2006)
-
Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, and A. Yautsiukhin. Security and trust in it business outsourcing: a manifesto. Electronic Notes in Theoretical Computer Science, 179:47 - 58, 2007. Proc. of the 2nd Int. Workshop on Security and Trust Management (STM 2006).
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.179
, pp. 47-58
-
-
Karabulut, Y.1
Kerschbaum, F.2
Massacci, F.3
Robinson, P.4
Yautsiukhin, A.5
-
15
-
-
4344688863
-
Learning to contract: Evidence from the personal computer industry
-
K. Mayer and N. Argyres. Learning to Contract: Evidence from the Personal Computer Industry. Organization Science, 15(4):394-410, 2004.
-
(2004)
Organization Science
, vol.15
, Issue.4
, pp. 394-410
-
-
Mayer, K.1
Argyres, N.2
-
16
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
D. Mellado, E. Fernańdez-Medina, and M. Piattini. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces, 29(2):244-253, 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
17
-
-
51749097143
-
Security decision-making among interdependent organizations
-
R. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos. Security Decision-Making among Interdependent Organizations. Computer Security Foundations Symposium, IEEE, 0:66-80, 2008.
-
(2008)
Computer Security Foundations Symposium, IEEE
, pp. 66-80
-
-
Miura-Ko, R.1
Yolken, B.2
Mitchell, J.3
Bambos, N.4
-
19
-
-
78650332387
-
-
Technical Report (Submited) TRCTIT-09-30, Centre for Telematics and Information Technology, University of Twente
-
A. Morali, E. Zambon, S. Etalle, and R. J. Wieringa. CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks. Technical Report (Submited) TRCTIT- 09-30, Centre for Telematics and Information Technology, University of Twente, 2009.
-
(2009)
CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks
-
-
Morali, A.1
Zambon, E.2
Etalle, S.3
Wieringa, R.J.4
-
21
-
-
0036684519
-
Do formal contracts and relational governance function as substitutes or complements?
-
L. Poppo and T. Zenger. Do formal contracts and relational governance function as substitutes or complements? Strategic Management J., 23:707-725, 2002.
-
(2002)
Strategic Management J.
, vol.23
, pp. 707-725
-
-
Poppo, L.1
Zenger, T.2
-
22
-
-
17444417128
-
Averting security missteps in outsourcing
-
E. Power and R. Trope. Averting security missteps in outsourcing. IEEE Security and Privacy, 3(2):70-73, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 70-73
-
-
Power, E.1
Trope, R.2
-
23
-
-
0011785265
-
The role of trust in outsourced is development projects
-
R. Sabherwal. The role of trust in outsourced is development projects. Commun. ACM, 42(2):80-86, 1999.
-
(1999)
Commun ACM
, vol.42
, Issue.2
, pp. 80-86
-
-
Sabherwal, R.1
-
24
-
-
35248841119
-
Challenges and recommendations when increasing the realism of controlled software engineering experiments
-
R. Conradi and A. Wang, editors,. Springer,. LNCS
-
D. Sjøberg, B. Anda1, E. Arisholm1, T. Dybå, M. Jørgensen1, A. Karahasanović, and M. Vokáccaron. Challenges and recommendations when increasing the realism of controlled software engineering experiments. In R. Conradi and A. Wang, editors, Empirical Methods and Studies in Software Engineering, pages 24-38. Springer, 2003. LNCS 2765.
-
(2003)
Empirical Methods and Studies in Software Engineering
, vol.2765
, pp. 24-38
-
-
Sjøberg, D.1
Anda, B.2
Arisholm, E.3
Dybå, T.4
Jørgensen, M.5
Karahasanović, A.6
Vokáccaron, M.7
-
27
-
-
31044444123
-
Requirements engineering paper classification and evaluation criteria: A proposal and a discussion
-
R. Wieringa, N. Maiden, N. Mead, and C. Rolland. Requirements engineering paper classification and evaluation criteria: A proposal and a discussion. J. Req. Eng., 11(1):102-107, 2006.
-
(2006)
J. Req. Eng.
, vol.11
, Issue.1
, pp. 102-107
-
-
Wieringa, R.1
Maiden, N.2
Mead, N.3
Rolland, C.4
|