-
1
-
-
0003611953
-
-
AMICE Consortium, Springer-Verlag
-
AMICE Consortium. (1993). Open system architecture for CIM. Springer-Verlag.
-
(1993)
Open System Architecture For CIM
-
-
-
2
-
-
0028532579
-
Why cryptosystems fail
-
Anderson, R. (1994). Why cryptosystems fail. Communication of the ACM, 37(11), 32-40.
-
(1994)
Communication of the ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.1
-
3
-
-
24944578141
-
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., & Schunter, M. (2003). Enterprise privacy authorization language (EPAL 1.2). W3C Recommendation.
-
(2003)
Enterprise Privacy Authorization Language (EPAL 1.2). W3C Recommendation
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
5
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J., & Lodderstedt, T. (2006). Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology, 15(1), 39-91.
-
(2006)
ACM Transactions On Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
6
-
-
0030182473
-
A framework to define a generic enterprise reference architecture and methodology
-
Bernus, P., & Nemes, L. (1996). A framework to define a generic enterprise reference architecture and methodology. Computer Integrated Manufacturing Systems, 9(3), 179-191.
-
(1996)
Computer Integrated Manufacturing Systems
, vol.9
, Issue.3
, pp. 179-191
-
-
Bernus, P.1
Nemes, L.2
-
7
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., & Perini, A. (2004). TROPOS: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems, 8(3), 203-236.
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
8
-
-
84898222930
-
-
Associates, Retrieved June 15, 2007, from
-
Bryce, M., & Associates. (2006). PRIDE-EEM enterprise engineering methodology. Retrieved June 15, 2007, from http://www.phmainstreet.com/mba/pride/eemeth.htm
-
(2006)
PRIDE-EEM Enterprise Engineering Methodology
-
-
Bryce, M.1
-
9
-
-
85041439566
-
Principles of trust for MAS: Cognitive anatomy, social importance, and quantification
-
IEEE Press
-
Castelfranchi, C., & Falcone, R. (1998). Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In International Conference on Multi-Agent Systems (pp. 72-79). IEEE Press.
-
(1998)
In International Conference On Multi-Agent Systems
, pp. 72-79
-
-
Castelfranchi, C.1
Falcone, R.2
-
10
-
-
0003696305
-
-
Kluwer Publishing
-
Chung, L.K., Nixon, B.A., Yu, E., & Mylopoulos, J. (2000). Non-functional requirements in software engineering. Kluwer Publishing.
-
(2000)
Non-functional Requirements In Software Engineering
-
-
Chung, L.K.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
11
-
-
0013243382
-
-
W3C Recommendation
-
Cranor, L., Langheinrich, M., Marchiori, M., & Reagle, J. (2002). The platform for privacy preferences 1.0 (P3P1.0) Specification. W3C Recommendation.
-
(2002)
The Platform For Privacy Preferences 1.0 (P3P1.0) Specification
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Reagle, J.4
-
12
-
-
0027574423
-
Goal-directed requirements acquisition
-
Dardenne, A., van Lamsweerde, A., & Fickas, S. (1993). Goal-directed requirements acquisition. Science of Computer Programming, 20, 3-50.
-
(1993)
Science of Computer Programming
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
van Lamsweerde, A.2
Fickas, S.3
-
15
-
-
33749035450
-
Requirements engineering for trust management: Model, methodology, and reasoning
-
Giorgini, P., Massacci, F., Mylopoulos, J., & Zannone, N. (2006). Requirements engineering for trust management: Model, methodology, and reasoning. International Journal of Information Security, 5(4), 257-274.
-
(2006)
International Journal of Information Security
, vol.5
, Issue.4
, pp. 257-274
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
16
-
-
84924413055
-
Security and trust requirements engineering
-
LNCS 3655, Springer
-
Giorgini, P., Massacci, F., & Zannone, N. (2005). Security and trust requirements engineering. In FOSAD III, LNCS 3655 (pp. 237-272). Springer.
-
(2005)
In FOSAD III
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
17
-
-
84875309305
-
-
House of Lords, Retrieved June 15, 2007, from
-
House of Lords. (1999). Prince Jefri Bolkiah vs. KPMG. 1 All ER 517. Retrieved June 15, 2007, from www.parliament.the-stationeryoffice.co.uk
-
(1999)
Prince Jefri Bolkiah Vs. KPMG. 1 All ER 517
-
-
-
18
-
-
84948180066
-
A model for the structural, functional, and deontic specification of organizations in multiagent Systems
-
Springer
-
Hübner, J.F., Sichman, J.S., & Boissier, O. (2002). A model for the structural, functional, and deontic specification of organizations in multiagent Systems. In Brazilian symposium on artificial intelligence (pp. 118-128). Springer.
-
(2002)
In Brazilian Symposium On Artificial Intelligence
, pp. 118-128
-
-
Hübner, J.F.1
Sichman, J.S.2
Boissier, O.3
-
20
-
-
17544394392
-
Computer security in the real world
-
Lampson, B.W. (2004). Computer security in the real world. Computer, 37(6), 37-46.
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
21
-
-
33745244351
-
The DLV system for knowledge representation and reasoning
-
Leone, N., Pfeifer, G., Faber, W., Eiter, T., Gottlob, G., Perri, S., et al. (2006). The DLV system for knowledge representation and reasoning. ACM Transactions on Computational Logic, 7(3), 499-562.
-
(2006)
ACM Transactions On Computational Logic
, vol.7
, Issue.3
, pp. 499-562
-
-
Leone, N.1
Pfeifer, G.2
Faber, W.3
Eiter, T.4
Gottlob, G.5
Perri, S.6
-
23
-
-
85067736297
-
Social roles and their descriptions
-
AAAI Press
-
Masolo, C., Vieu, L., Bottazzi, E., Catenacci, C., Ferrario, R., Gangemi, A. et al. (2004). Social roles and their descriptions. In Conference on the Principles of Knowledge Representation and Reasoning (pp. 267-277). AAAI Press.
-
(2004)
In Conference On the Principles of Knowledge Representation and Reasoning
, pp. 267-277
-
-
Masolo, C.1
Vieu, L.2
Bottazzi, E.3
Catenacci, C.4
Ferrario, R.5
Gangemi, A.6
-
24
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
Massacci, F., Prest, M., & Zannone, N. (2005). Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces, 27(5), 445-455.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
26
-
-
0042495505
-
An integrative model of organizational trust
-
Mayer, R.C., Davis, J.H., & Schoorman, F.D. (1995). An integrative model of organizational trust. Acad. Management Rev, 20(3), 709-734.
-
(1995)
Acad. Management Rev
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
28
-
-
0033442404
-
Conflict of interest and the credibility of underwriter analyst recommendations
-
Michaely, R., & Womack, K.L. (1999). Conflict of interest and the credibility of underwriter analyst recommendations. Review of Financial Studies, 12(4), 653-686.
-
(1999)
Review of Financial Studies
, vol.12
, Issue.4
, pp. 653-686
-
-
Michaely, R.1
Womack, K.L.2
-
29
-
-
2442512413
-
-
OASIS, OASIS Standard. Retrieved June 15, 2007, from
-
OASIS. (2005). eXtensible access control markup language (XACML) Version 2.0. OASIS Standard. Retrieved June 15, 2007, from http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-specos.pdf
-
(2005)
EXtensible Access Control Markup Language (XACML) Version 2.0
-
-
-
30
-
-
57649209186
-
Not so different after all: A cross-discipline view of trust
-
Rousseau, D.M., Sitkin, S.B., Burt, R.S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Acad. Management Rev., 23(3), 393-404.
-
(1998)
Acad. Management Rev
, vol.23
, Issue.3
, pp. 393-404
-
-
Rousseau, D.M.1
Sitkin, S.B.2
Burt, R.S.3
Camerer, C.4
-
31
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., & Youman, C.E. (1996). Role-based access control models. Computer, 29(2), 38-47.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
32
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., & Opdahl, A.L. (2005). Eliciting security requirements with misuse cases. Requirements Engineering Journal, 10(1), 34-44.
-
(2005)
Requirements Engineering Journal
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
35
-
-
0032028766
-
The enterprise ontology
-
Uschold, M., King, M., Moralee, S., & Zorgios, Y. (1998). The enterprise ontology. Knowledge Engineering Review, 13(1), 31-89.
-
(1998)
Knowledge Engineering Review
, vol.13
, Issue.1
, pp. 31-89
-
-
Uschold, M.1
King, M.2
Moralee, S.3
Zorgios, Y.4
|