-
1
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and M. Schroeder, "The protection of information in computer systems," Proceedings of the IEEE.63(9), pp.1278-1308, September 1975
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
2
-
-
84865037479
-
-
Information society
-
Information society, "Summary of legislation, European Commission", http://europa.eu/legislation-summaries/information-society/ index-en.htm
-
Summary of Legislation, European Commission
-
-
-
4
-
-
38149067484
-
Towards a framework for tracking legal compliance in healthcare
-
In J. Krogstie, A. L. Opdahl, and G. Sindre, editors, Springer
-
S. Ghanavati, D. Amyot, and L. Peyton, "Towards a framework for tracking legal compliance in healthcare," In J. Krogstie, A. L. Opdahl, and G. Sindre, editors, 19th International Conference on Advanced Information Systems Engineering (CAiSE'07), pp. 218-232. Springer, 2007
-
(2007)
19th International Conference on Advanced Information Systems Engineering (CAiSE'07)
, pp. 218-232
-
-
Ghanavati, S.1
Amyot, D.2
Peyton, L.3
-
7
-
-
77955462130
-
Toward a framework to elicit and manage security and privacy requirments from laws and regulation
-
S. Islam, H.Mouratidis, S.Wagner, "Toward a framework to elicit and manage security and privacy requirments from laws and regulation," Lecture Notes in Computer Science, Volume 6182/2010, pp.255-261, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6182
, Issue.2010
, pp. 255-261
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
-
9
-
-
79959729769
-
A Framework to Support Alignment of Secure Software Engineering with Legal Regulations
-
Springer-Verlag
-
S. Islam, H. Mouratidis and J. Jürjens, A Framework to Support Alignment of Secure Software Engineering with Legal Regulations, Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML), Vol 10, No 3, page 369-394, 2011, Springer-Verlag.
-
(2011)
Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML)
, vol.10
, Issue.3
, pp. 369-394
-
-
Islam, S.1
Mouratidis, H.2
Jürjens, J.3
-
10
-
-
0002953848
-
Fundamental legal conceptions as applied in judicial reasoning
-
W. N. Hohfeld, "Fundamental legal conceptions as applied in judicial reasoning," Yale Law Journal 23(1), 1913.
-
(1913)
Yale Law Journal
, vol.23
, Issue.1
-
-
Hohfeld, W.N.1
-
11
-
-
40449096076
-
Analyzing regulator rules for privacy and security requirements
-
January-February
-
T. D, Breaux and A. I. Antón, "Analyzing regulator rules for privacy and security requirements," IEEE transactions on software engineering, Vol. 34, No. 1, January-February 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
-
-
Breaux, T.D.1
Antón, A.I.2
-
14
-
-
33746038490
-
Towards a comprehensive framework for secure systems development
-
CAiSE 2006, Springer-Verlag
-
H. Mouratidis, J. Jürjens and J. Fox, "Towards a comprehensive framework for secure systems development," CAiSE 2006, Lecture Notes in Computer Science 4001,pp. 48-62, Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4001
, pp. 4862
-
-
Mouratidis, H.1
Jürjens, J.2
Fox, J.3
-
15
-
-
84871557995
-
-
GlobalPlatform, http://www.globalplatform.org/aboutus.asp
-
GlobalPlatform
-
-
-
16
-
-
84871557995
-
-
GlobalPlatform, http://www.globalplatform.org/specificationssystems.asp
-
GlobalPlatform
-
-
-
17
-
-
84864988834
-
-
European Commission Justice
-
European Commission Justice, Protection of Personal Data http://ec.europa.eu/justice/data-protection/index-en.htm
-
Protection of Personal Data
-
-
-
23
-
-
33751416458
-
A common criterion based security requirements engineering process for the development of secure information system
-
June
-
D. Mellado, E. Medina and M. Piattini, "A common criterion based security requirements engineering process for the development of secure information system," Computer standards & interfaces," 29:244-253, June 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 244-253
-
-
Mellado, D.1
Medina, E.2
Piattini, M.3
-
24
-
-
77950516884
-
Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec
-
March 2010, Special Issue on Security Requirements Engineering, Springer-Verlag
-
S. H. Houmb, S. Islam, E. Knauss, J. Jürjens and K. Schneider, Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, Requirements Engineering Journal (REJ), Vol 15, No 1, 2010, PP 63-93., March 2010, Special Issue on Security Requirements Engineering, Springer-Verlag.
-
(2010)
Requirements Engineering Journal (REJ)
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
25
-
-
27644537252
-
Modelling security requirements through ownership, permission and delegation
-
IEEE Computer Society Press, 29 August - 2 September
-
P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone, "Modelling security requirements through ownership, permission and delegation," In Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05), IEEE Computer Society Press, 29 August - 2 September 2005.
-
(2005)
Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05)
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
|