-
1
-
-
80052718732
-
Architectural Principles for Orchestration of Cross-Organizational Service Delivery: Case Studies from the Netherlands
-
Assar, S., Boughzala, I., Boydens, I. (eds.) Springer, New York
-
Van Veenstra, A.F., Janssen, M.: Architectural Principles for Orchestration of Cross-Organizational Service Delivery: Case Studies from the Netherlands. In: Assar, S., Boughzala, I., Boydens, I. (eds.) Practical Studies in E-Government: Best Practices from Around the World, pp. 167-185. Springer, New York (2011)
-
(2011)
Practical Studies in E-Government: Best Practices from Around the World
, pp. 167-185
-
-
Van Veenstra, A.F.1
Janssen, M.2
-
3
-
-
84867973432
-
Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
-
Belanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11, 245-270 (2002)
-
(2002)
Journal of Strategic Information Systems
, vol.11
, pp. 245-270
-
-
Belanger, F.1
Hiller, J.S.2
Smith, W.J.3
-
4
-
-
77649281933
-
Information privacy concerns and e-government: A research agenda
-
Carter, L., McBride, A.: Information privacy concerns and e-government: a research agenda. Transforming Government: People, Process and Policy 4(1), 10-13 (2010)
-
(2010)
Transforming Government: People, Process and Policy
, vol.4
, Issue.1
, pp. 10-13
-
-
Carter, L.1
McBride, A.2
-
6
-
-
65449127740
-
Evaluating procedural alternatives: A case study in e-voting
-
Bryl, V., Dalpiaz, F., Ferrario, R., Mattioli, A., Villafiorita, A.: Evaluating procedural alternatives: A case study in e-voting. Electronic Government 6(2), 213-231 (2009)
-
(2009)
Electronic Government
, vol.6
, Issue.2
, pp. 213-231
-
-
Bryl, V.1
Dalpiaz, F.2
Ferrario, R.3
Mattioli, A.4
Villafiorita, A.5
-
7
-
-
4644297648
-
Building Secure Elections: E-Voting, Security and Systems Theory
-
Moynihan, D.P.: Building Secure Elections: E-Voting, Security and Systems Theory. Public Administration Review 64(5), 515-528 (2004)
-
(2004)
Public Administration Review
, vol.64
, Issue.5
, pp. 515-528
-
-
Moynihan, D.P.1
-
9
-
-
34548043205
-
Securing e-voting as a legitimate option for e-governance
-
Smith, A.D.: Securing e-voting as a legitimate option for e-governance. Electronic Government 4(3), 269-289 (2007)
-
(2007)
Electronic Government
, vol.4
, Issue.3
, pp. 269-289
-
-
Smith, A.D.1
-
10
-
-
70549093057
-
Opportunities and threats: A security assessment of state e-government websites
-
Zhao, J.J., Zhao, S.Y.: Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly 27, 49-56 (2010)
-
(2010)
Government Information Quarterly
, vol.27
, pp. 49-56
-
-
Zhao, J.J.1
Zhao, S.Y.2
-
11
-
-
38549147623
-
An Analysis of the Security Patterns Landscape
-
IEEE Computer Society, Washington, DC
-
Heyman, T., Yskout, K., Scandariato, R., Joosen, W.: An Analysis of the Security Patterns Landscape. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007). IEEE Computer Society, Washington, DC (2007)
-
(2007)
Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007)
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
-
13
-
-
0037886248
-
User group structures in object-oriented database authorization
-
North-Holland Publishing Co., Amsterdam
-
Fernandez, E.B., Wu, J., Fernandez, M.H.: User group structures in object-oriented database authorization. In: Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, pp. 57-76. North-Holland Publishing Co., Amsterdam (1994)
-
(1994)
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
, pp. 57-76
-
-
Fernandez, E.B.1
Wu, J.2
Fernandez, M.H.3
-
15
-
-
0004101997
-
-
Wiley, Hoboken
-
Schmidt, D., Stal, M., Rohnert, H., Buschmann, F.: Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked, vol. 2. Wiley, Hoboken (2000)
-
(2000)
Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked
, vol.2
-
-
Schmidt, D.1
Stal, M.2
Rohnert, H.3
Buschmann, F.4
-
18
-
-
38149113771
-
-
Monticello, Illinois, USA
-
Yoder, J., Barcalow, J.: Architectural patterns for enabling application security, Monticello, Illinois, USA (1997)
-
(1997)
Architectural Patterns for Enabling Application Security
-
-
Yoder, J.1
Barcalow, J.2
-
19
-
-
33751006553
-
Tropyc: A pattern language for cryptographic object-oriented software
-
Harrison, N., Foote, B., Rohnert, H. (eds.) ch.16
-
Braga, A., Rubira, C., Dahab, R.: Tropyc: A pattern language for cryptographic object-oriented software. In: Harrison, N., Foote, B., Rohnert, H. (eds.) Pattern Languages of Program Design, ch.16, vol. 4 (1998)
-
(1998)
Pattern Languages of Program Design
, vol.4
-
-
Braga, A.1
Rubira, C.2
Dahab, R.3
-
21
-
-
38549147623
-
An analysis of the security patterns landscape
-
IEEE Computer Society, Washington, DC, USA
-
Heyman, T., Yskout, K., Scandariato, R., Joosen, W.: An analysis of the security patterns landscape. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007), IEEE Computer Society, Washington, DC, USA (2007)
-
(2007)
Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007)
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
-
22
-
-
84874061215
-
Access controls by object-oriented concepts
-
Chapman & Hall, Ltd, London
-
Pernul, E.W.G., Tjoa, A.M.: Access controls by object-oriented concepts. In: Proceedings of the IFIP TC11WG11.3, Eleventh International Conference on Database Security XI: Status and Prospects, pp. 325-340. Chapman & Hall, Ltd, London (1998)
-
(1998)
Proceedings of the IFIP TC11WG11.3, Eleventh International Conference on Database Security XI: Status and Prospects
, pp. 325-340
-
-
Pernul, E.W.G.1
Tjoa, A.M.2
-
24
-
-
80052780788
-
Aplrac: A pattern language for designing and implementing role-based access control
-
Kodituwakku, S.R., Bertok, P., Zhao, L.: Aplrac: A pattern language for designing and implementing role-based access control. In: Proceedings of the Sixth European Conference on Pattern Languages of Programs, EuroPLoP (2001)
-
Proceedings of the Sixth European Conference on Pattern Languages of Programs, EuroPLoP (2001)
-
-
Kodituwakku, S.R.1
Bertok, P.2
Zhao, L.3
-
26
-
-
33750050331
-
-
John Wiley & Sons, Hoboken
-
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerland, P.: Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, Hoboken (2006)
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerland, P.5
|