-
3
-
-
0031597158
-
Techniques for trusted software engineering
-
April
-
Devanbu, P., Fong, P.W., Stubblebine, S.G., Techniques for Trusted Software Engineering, Proceedings of the 20th International Conference on Software Engineering, Pages. 126-135, April 1998.
-
(1998)
Proceedings of the 20th International Conference on Software Engineering
, pp. 126-135
-
-
Devanbu, P.1
Fong, P.W.2
Stubblebine, S.G.3
-
4
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
June
-
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J. and Moody, K., Using Trust and Risk in Role-Based Access Control Policies, Proceedings of the ninth ACM symposium on Access control models and technologies, June 2004.
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
6
-
-
0009481412
-
A survey of trust in internet applications
-
2004
-
Grandison, T. and Sloman, M., A Survey of trust in internet applications, IEEE Communications Surveys and Tutorials 3 2000, pp. 2-16, 2004.
-
(2000)
IEEE Communications Surveys and Tutorials
, vol.3
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
7
-
-
18944394652
-
Modeling and verification of layered security protocols: A bank application
-
Grunbauer, J., Hollmann, H., Jurjens, J. and Wimmel, G., Modeling and Verification of Layered Security Protocols: A Bank Application, SAFECOMP 2003, LNCS 2788, pp. 116-129, 2003.
-
(2003)
SAFECOMP 2003, LNCS
, vol.2788
, pp. 116-129
-
-
Grunbauer, J.1
Hollmann, H.2
Jurjens, J.3
Wimmel, G.4
-
8
-
-
19944395899
-
Propagation of trust and distrust
-
May
-
Guha, R., Kumar, R., Raghavan, P. and Tomkins A., Propagation of Trust and Distrust, Proceedings of the 13th international conference on WWW, May 2004.
-
(2004)
Proceedings of the 13th International Conference on WWW
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
9
-
-
35048837543
-
Picking battles: The impact of trust assumptions on the elaboration of security requirements
-
Haley, C., Laney, R., Moffett, J., and Nuseibeh, B., Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements, iTrust 2004, LNCS 2995, pp. 347-354, 2004.
-
(2004)
ITrust 2004, LNCS
, vol.2995
, pp. 347-354
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
11
-
-
85027584208
-
Internet engineering task force
-
Internet Engineering Task Force, RFC 2828, www.ietf.org
-
RFC 2828
-
-
-
12
-
-
0036534530
-
-
March
-
McGraw, G., Managing Software Security Risks, IEEE Computer , Vol. 35, Issue: 4, March 2002, Pages: 99-101.
-
(2002)
Managing Software Security Risks IEEE Computer
, vol.35
, Issue.4
, pp. 99-101
-
-
McGraw, G.1
-
13
-
-
0038601459
-
The grand challenge of trusted components
-
May
-
Meyer, B., The Grand Challenge of Trusted Components, Proceeding of 25th ICSE, 2003, Pages. 660-667, May 2003.
-
(2003)
Proceeding of 25th ICSE 2003
, pp. 660-667
-
-
Meyer, B.1
-
14
-
-
84957035924
-
Formal security analysis with interacting state machines
-
Oheimb, D. and Lotz, V., Formal Security Analysis with Interacting State Machines, ESORICS 2002, LNCS 2502, pp. 212-229, 2002.
-
(2002)
ESORICS 2002, LNCS
, vol.2502
, pp. 212-229
-
-
Oheimb, D.1
Lotz, V.2
-
15
-
-
33646357597
-
A vector model of trust for developing trustworthy systems
-
Ray, I. and Chakraborty, S., A Vector Model of Trust for Developing Trustworthy Systems, ESORIC 2004, LCNS 3139, pp. 260-275, 2004.
-
(2004)
ESORIC 2004, LCNS
, vol.3139
, pp. 260-275
-
-
Ray, I.1
Chakraborty, S.2
-
16
-
-
84881225236
-
Enforceable security policies
-
Feb
-
Schneider, F., Enforceable Security Policies, ACM Trans. On Information and System Security, Vol. 3, No. 1, Feb. 2000, pp. 30-50.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
17
-
-
17644399080
-
Risk management guide for information technology systems
-
Stoneburner, G., Grogen, A., Dering, A., Risk Management Guide for Information Technology Systems, National Institute for Standards and Technology, SP 800-30.
-
National Institute for Standards and Technology, SP
, pp. 800-830
-
-
Stoneburner, G.1
Grogen, A.2
Dering, A.3
-
19
-
-
0002686025
-
Trust (and mistrust) in secure applications
-
Feb
-
Viega, J., Kohno, T. and Potter, B., Trust (and Mistrust) in Secure Applications, Communications of the ACM, Feb 2001, Vol. 44, No. 2.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
-
-
Viega, J.1
Kohno, T.2
Potter, B.3
|