-
1
-
-
17744389340
-
A requirements taxonomy for reducing Web site privacy vulnerabilities
-
A.I. Antón, and J.B. Earp A requirements taxonomy for reducing web site privacy vulnerabilities Requirements Engineering Journal 9 3 Spring 2004 169 185 (Pubitemid 39168556)
-
(2004)
REQUIREMENTS ENGINEERING
, vol.9
, Issue.3
, pp. 169-185
-
-
Anton, A.I.1
Earp, J.B.2
-
3
-
-
3042736362
-
Internet privacy law: A comparison between the United states and the European Union
-
David L. Baumer, Julie B. Earp, and J.C. Poindexter Internet privacy law: a comparison between the United states and the European Union Computers and Security 23 5 2004 400 412
-
(2004)
Computers and Security
, vol.23
, Issue.5
, pp. 400-412
-
-
Baumer, D.L.1
Earp, J.B.2
Poindexter, J.C.3
-
4
-
-
84889708715
-
To serve and protect: Do businesses have a legal duty to protect collections of personal information?
-
D.A. Bishop To serve and protect: do businesses have a legal duty to protect collections of personal information? Shidler Journal of Law, Commerce and Technology 3 2006 7
-
(2006)
Shidler Journal of Law, Commerce and Technology
, vol.3
, pp. 7
-
-
Bishop, D.A.1
-
5
-
-
79955478956
-
The HIPAA final security standards and ISO/IEC 17799
-
SANS Institute
-
S. Borkin The HIPAA final security standards and ISO/IEC 17799 In collect. information security reading room July 2003 SANS Institute
-
(2003)
Collect. Information Security Reading Room
-
-
Borkin, S.1
-
9
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
T.D. Breaux, and A.I. Antón Analyzing regulatory rules for privacy and security requirements IEEE Transactions on Software Engineering 34 1 January/February 2008 5 20 Special Issue on Software Engineering for Secure Systems
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
12
-
-
58049178595
-
Legal requirements, compliance and practice: An industry case study in accessibility
-
Barcelona, Spain; Sep
-
Breaux TD, Antón AI, Boucher K, Dorfman M. Legal requirements, compliance and practice: an industry case study in accessibility. In: IEEE 16th international requirements engineering conference (RE'08), Barcelona, Spain; Sep. 2008a. p. 43-52.
-
(2008)
IEEE 16th International Requirements Engineering Conference (RE'08)
, pp. 43-52
-
-
Breaux, T.D.1
Antón, A.I.2
Boucher, K.3
Dorfman, M.4
-
13
-
-
72949095313
-
Identifying legal vulnerabilities and critical requirements using criminal court proceedings
-
Honolulu, Hawaii; Aug
-
Breaux TD, Lewis JD, Otto PN, Antón AI. Identifying legal vulnerabilities and critical requirements using criminal court proceedings. In: 24th ACM/SIGAPP Symposium on Applied Computing (ACM SAC'09), Honolulu, Hawaii; Aug. 2008. pp. 355-359.
-
(2008)
24th ACM/SIGAPP Symposium on Applied Computing (ACM SAC'09)
, pp. 355-359
-
-
Breaux, T.D.1
Lewis, J.D.2
Otto, P.N.3
Antón, A.I.4
-
14
-
-
57849159727
-
A distributed requirements management framework for compliance and accountability
-
T.D. Breaux, A.I. Antón, and E.H. Spafford A distributed requirements management framework for compliance and accountability Computers and Security 28 1-2 2009 8 17
-
(2009)
Computers and Security
, vol.28
, Issue.12
, pp. 8-17
-
-
Breaux, T.D.1
Antón, A.I.2
Spafford, E.H.3
-
15
-
-
33645586196
-
Using security patterns to model and analyze security requirements
-
Kyoto, Japan; Sep
-
Cheng Betty HC, Konrad Sasha, Campbell Laura A, Wasserman Ronald. Using security patterns to model and analyze security requirements. In: Proc. 2nd international workshop on requirements engineering for high assurance systems (RHAS-2), Kyoto, Japan; Sep. 2003. p. 13-22.
-
(2003)
Proc. 2nd International Workshop on Requirements Engineering for High Assurance Systems (RHAS-2)
, pp. 13-22
-
-
Cheng Betty, H.C.1
Sasha, K.2
Campbell Laura, A.3
Wasserman, R.4
-
16
-
-
33847309878
-
E-commerce and information privacy: Privacy policies as personal information protectors
-
C.A. Ciocchetti E-commerce and information privacy: privacy policies as personal information protectors American Business Law Journal 44 Spring, 2007 55
-
(2007)
American Business Law Journal
, vol.44
, pp. 55
-
-
Ciocchetti, C.A.1
-
18
-
-
79955480036
-
2007 eCrime watch survey
-
®, and Microsoft Corp
-
®, and Microsoft Corp 2007 eCrime watch survey CSO Magazine Sep. 2007
-
(2007)
CSO Magazine
-
-
-
19
-
-
77956434614
-
Reasoning about airport security regulations using the focal environment
-
Paphos; Nov
-
Delahaye D, Etienne J-F, Donzeau-Gouge VV. Reasoning about airport security regulations using the focal environment. In: 2nd international symposium on leveraging applications of formal methods, verification and validation, Paphos; Nov. 2006, p. 45-52.
-
(2006)
2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation
, pp. 45-52
-
-
Delahaye, D.1
Etienne, J.-F.2
Donzeau-Gouge, V.V.3
-
21
-
-
0003706051
-
-
8th ed ThompsonWest St. Paul, Minnesota
-
B.A. Garner Blacks law dictionary 8th ed 2004 ThompsonWest St. Paul, Minnesota
-
(2004)
Blacks Law Dictionary
-
-
Garner, B.A.1
-
24
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
DOI 10.1109/TSE.2007.70754
-
C.B. Haley, R.C. Laney, J.D. Moffett, and B. Nuseibeh Security requirements engineering: a framework for representation and analysis IEEE Transactions on Software Engineering 34 1 2008 133 153 (Pubitemid 351343906)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
25
-
-
79955479555
-
Liability for consumer information security breaches: Deconstructing FTC complaints against businesses victimized by consumer information security breaches
-
J.B. Hanson Liability for consumer information security breaches: deconstructing FTC complaints against businesses victimized by consumer information security breaches Shidler Journal of Law, Commerce and Technology 4 2008 11
-
(2008)
Shidler Journal of Law, Commerce and Technology
, vol.4
, pp. 11
-
-
Hanson, J.B.1
-
26
-
-
79955481881
-
Control objectives for information and related technology (COBIT)
-
Information Technology Governance Institute
-
Information Technology Governance Institute, Control objectives for information and related technology (COBIT), Version 4.1; 2007.
-
(2007)
Version 4.1
-
-
-
30
-
-
47949130986
-
Business process-based regulatory compliance: The case of the Sarbanes-Oxley act
-
Karagiannis D, Mylopoulos J, Schwab M. Business process-based regulatory compliance: the case of the Sarbanes-Oxley act, In: IEEE Int'l Req'ts Engr. Conf.; 2007. p. 315-21.
-
(2007)
IEEE Int'l req'Ts Engr. Conf.
, pp. 315-321
-
-
Karagiannis, D.1
Mylopoulos, J.2
Schwab, M.3
-
31
-
-
84870321814
-
2008 Identity fraud survey report: Identity fraud continues to decline, but criminals more effective at using all channels
-
R. Kim 2008 Identity fraud survey report: identity fraud continues to decline, but criminals more effective at using all channels Javelin Strategy and Research Feb. 2008
-
(2008)
Javelin Strategy and Research
-
-
Kim, R.1
-
32
-
-
33845292826
-
Building decision support problem domain ontology from natural language requirements for software assurance
-
DOI 10.1142/S0218194006003051, PII S0218194006003051
-
S.W. Lee, D. Muthurajan, R.A. Gandhi, D. Yavagal, and G. Ahn Building decision support problem domain ontology from security requirements to engineer software-intensive systems International Journal on Software Engineering and Knowledge Engineering 16 6 Dec. 2006 851 884 (Pubitemid 46181435)
-
(2006)
International Journal of Software Engineering and Knowledge Engineering
, vol.16
, Issue.6
, pp. 851-884
-
-
Lee, S.-W.1
Muthurajan, D.2
Gandhi, R.A.3
Yavagal, D.4
Ahn, G.-J.5
-
33
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
Sep
-
Lin L, Nuseibeh B, Ince D, Jackson M, Moffett J, Introducing abuse frames for analysing security requirements. In: IEEE 11th international requirements engineering conference, Sep. 2003. p. 371-2.
-
(2003)
IEEE 11th International Requirements Engineering Conference
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
34
-
-
34548563765
-
Computer-aided support for secure tropos
-
DOI 10.1007/s10515-007-0013-5
-
F. Massacci, J. Mylopoulos, and N. Zannone Computer-aided support for Secure Tropos Automated Software Engineering 14 3 Sep. 2007 341 364 (Pubitemid 47397543)
-
(2007)
Automated Software Engineering
, vol.14
, Issue.3
, pp. 341-364
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
35
-
-
85088409477
-
Security quality requirements engineering (SQUARE) methodology, Proc. Software Engineering for Secure Systems (SESS) - Building trustworthy applications
-
N.R. Mead, and T. Stehney Security quality requirements engineering (SQUARE) methodology, Proc. Software Engineering for Secure Systems (SESS) - building trustworthy applications ACM Software Engineering Notes 30 4 2005 1 7
-
(2005)
ACM Software Engineering Notes
, vol.30
, Issue.4
, pp. 1-7
-
-
Mead, N.R.1
Stehney, T.2
-
36
-
-
4243139489
-
The HIPAA-potamus in health care data security
-
Rebecca T. Mercuri The HIPAA-potamus in health care data security Communications of the ACM 47 7 2004 25 28
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 25-28
-
-
Mercuri, R.T.1
-
37
-
-
77954707932
-
Reasonableness meets requirements: Regulating security and privacy in software
-
P.N. Otto Reasonableness meets requirements: regulating security and privacy in software Duke Law Journal 2009
-
(2009)
Duke Law Journal
-
-
Otto, P.N.1
-
38
-
-
79955483804
-
Protecting the most valuable corporate asset: Electronic data, identity theft, personal information and the role of data security in the information age
-
K.M. Siegel Protecting the most valuable corporate asset: electronic data, identity theft, personal information and the role of data security in the information age Pennsylvania State Law Review 111 Winter 2007 779
-
(2007)
Pennsylvania State Law Review
, vol.111
, pp. 779
-
-
Siegel, K.M.1
-
39
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering Journal 10 1 Jan. 2005 34 44
-
(2005)
Requirements Engineering Journal
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
40
-
-
79955476068
-
It's all about trust: The expanding scope of security obligations in global privacy and e-transactions law
-
T.J. Smedinghoff It's all about trust: the expanding scope of security obligations in global privacy and e-transactions law Michigan State Journal of International Law 16 2007 1
-
(2007)
Michigan State Journal of International Law
, vol.16
, pp. 1
-
-
Smedinghoff, T.J.1
-
41
-
-
27644567989
-
Legal requirements reuse: A critical success factor for requirements quality and personal data protection
-
Toval S, Olmos A, Piattini M. Legal requirements reuse: a critical success factor for requirements quality and personal data protection. In: IEEE Int'l Conf. Req'ts Engr., 2002, pp. 95-103.
-
(2002)
IEEE Int'l Conf. req'Ts Engr.
, pp. 95-103
-
-
Toval, S.1
Olmos, A.2
Piattini, M.3
|