-
2
-
-
21144450607
-
-
ANSI INCITS 359-2004. American Nat'l Standard for Information Technology
-
ANSI INCITS 359-2004. Role-Based Access Control. American Nat'l Standard for Information Technology (2004)
-
(2004)
Role-Based Access Control
-
-
-
3
-
-
33746200049
-
Security planning and refactoring in extreme programming
-
Extreme Programming and Agile Processes in Software Engineering - 7th International Conference, XP 2006, Proceedings
-
Aydal, E.G., Paige, R.F., Chivers, H., Brooke, P.J.: Security planning and refactoring in extreme programming. In: Abrahamsson, P., Marchesi, M., Succi, G. (eds.) XP 2006. LNCS, vol. 4044, pp. 154-163. Springer, Heidelberg (2006) (Pubitemid 44098513)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4044
, pp. 154-163
-
-
Aydal, E.G.1
Paige, R.F.2
Chivers, H.3
Brooke, P.J.4
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
26444465547
-
Agile security using an incremental security architecture
-
Extreme Programming and Agile Processes in Software Engineering: 6th International Conference, XP 2005. Proceedings
-
Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57-65. Springer, Heidelberg (2005) (Pubitemid 41424950)
-
(2005)
Lecture Notes in Computer Science
, vol.3556
, pp. 57-65
-
-
Chivers, H.1
Paige, R.F.2
Ge, X.3
-
6
-
-
77952404110
-
End user security: The democratisation of security usability
-
Church, L.: End user security: The democratisation of security usability. In: Security and Human Behaviour (2008)
-
(2008)
Security and Human Behaviour
-
-
Church, L.1
-
10
-
-
38149102523
-
Extreme programming security practices
-
Concas, G., Damiani, E., Scotto, M., Succi, G. (eds.). Springer, Heidelberg
-
Ge, X., Paige, R.F., Polack, F., Brooke, P.J.: Extreme programming security practices. In: Concas, G., Damiani, E., Scotto, M., Succi, G. (eds.) XP 2007. LNCS, vol. 4536, pp. 226-230. Springer, Heidelberg (2007)
-
(2007)
XP 2007. LNCS
, vol.4536
, pp. 226-230
-
-
Ge, X.1
Paige, R.F.2
Polack, F.3
Brooke, P.J.4
-
11
-
-
34248340450
-
Towards agile security in web applications
-
DOI 10.1145/1176617.1176727, 1176727, Companion to the 21st ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications, OOPSLA 2006
-
Kongsli, V.: Towards agile security in web applications. In: OOPSLA 2006: Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, pp. 805-808. ACM, New York (2006) (Pubitemid 46729405)
-
(2006)
Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA
, vol.2006
, pp. 805-808
-
-
Kongsli, V.1
-
13
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
Washington, DC, USA, IEEE Computer Society, Los Alamitos
-
McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: ACSAC 1999: Proceedings of the 15th Annual Computer Security Applications Conference, Washington, DC, USA, p. 55. IEEE Computer Society, Los Alamitos (1999)
-
(1999)
ACSAC 1999: Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 55
-
-
McDermott, J.1
Fox, C.2
-
14
-
-
0038825675
-
Task-role-based access control model
-
Oh, S., Park, S.: Task-role-based access control model. Inf. Syst. 28(6), 533-562 (2003)
-
(2003)
Inf. Syst.
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
15
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
16
-
-
33745668435
-
Flexible workflow incorporated with RBAC
-
Computer Supported Cooperative Work in Design II - 9th International Conference, CSCWD 2005, Revised Selected Papers
-
Sun, Y., Meng, X., Liu, S., Pan, P.: Flexible workflow incorporated with RBAC. In: Shen, W.-m., Chao, K.-M., Lin, Z., Barthès, J.-P.A., James, A. (eds.) CSCWD 2005. LNCS, vol. 3865, pp. 525-534. Springer, Heidelberg (2006) (Pubitemid 43971638)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3865
, pp. 525-534
-
-
Sun, Y.1
Meng, X.2
Liu, S.3
Pan, P.4
-
17
-
-
33847756784
-
Agile security testing of web-based systems via HTTPUnit
-
DOI 10.1109/ADC.2005.11, 1609802, Proceedings - AGILE Confernce 2005
-
Tappenden, A., Beatty, P., Miller, J.: Agile security testing of web-based systems via httpunit. In: AGILE, pp. 29-38. IEEE Computer Society Press, Los Alamitos (2005) (Pubitemid 46379839)
-
(2005)
Proceedings - AGILE Confernce 2005
, vol.2005
, pp. 29-38
-
-
Tappenden, A.1
Beatty, P.2
Miller, J.3
Geras, A.4
Smith, M.5
-
18
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented autorization management
-
London, UK, Chapman & Hall, Ltd., Boca Raton
-
Thomas, R.K., Sandhu, R.S.: Thomas and Ravi S. Sandhu. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented autorization management. In: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, London, UK, pp. 166-181. Chapman & Hall, Ltd., Boca Raton (1998)
-
(1998)
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
Thomas3
Sandhu, R.S.4
-
19
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
DOI 10.1142/S0218843003000814
-
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - a workflow security model incorporating controlled overriding of constraints. Int. J. Cooperative Inf. Syst. 12(4), 455-485 (2003) (Pubitemid 38000660)
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
20
-
-
84926001904
-
-
User-centered security, ACM, New York
-
Zurko, M.E., Simon, R.T.: User-centered security. In: NSPW 1996: Proceedings of the 1996 workshop on New security paradigms, pp. 27-33. ACM, New York (1996)
-
(1996)
NSPW 1996: Proceedings of the 1996 Workshop on New Security Paradigms
, pp. 27-33
-
-
Zurko, M.E.1
Simon, R.T.2
|