-
1
-
-
0026904804
-
Threats and Countermeasures
-
Aug
-
J. A. Adam, “Threats and Countermeasures,” IEEE Spectrum, vol. 29, no. 8, Aug. 1992, pp. 21-28.
-
(1992)
IEEE Spectrum
, vol.29
, Issue.8
, pp. 21-28
-
-
Adam, J.A.1
-
2
-
-
0026156083
-
Towards an Approach to Measuring Software Trust
-
May
-
E. Amoroso, T. Nguyen, J. Weiss, J. Watson, P. Lapiska, and T. Starr, “Towards an Approach to Measuring Software Trust,” Proc. IEEE Symp. Security and Privacy, May 1991, pp. 198-218.
-
(1991)
Proc. IEEE Symp. Security and Privacy
, pp. 198-218
-
-
Amoroso, E.1
Nguyen, T.2
Weiss, J.3
Watson, J.4
Lapiska, P.5
Starr, T.6
-
4
-
-
0024884419
-
Developing Trusted Systems Using DOD-STD-2167A
-
Tucson, Arizona, Dec. 4-8
-
T. C. Vickers Benzel, “Developing Trusted Systems Using DOD-STD-2167A,” 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4-8, 1989, pp. 166-176.
-
(1989)
5th Annual Computer Security Appl. Conf.
, pp. 166-176
-
-
Vickers Benzel, T.C.1
-
5
-
-
0001968281
-
A Spiral Model of Software Development and Enhancement
-
Aug.
-
B. W. Boehm, “A Spiral Model of Software Development and Enhancement”, Vol. 11, No. 4, ACM Software Eng. Notes, Aug. 1986.
-
(1986)
ACM Software Eng. Notes
, vol.11
, Issue.4
-
-
Boehm, B.W.1
-
6
-
-
0023327666
-
Cost-Effective Modeling for a Decision Support System in Computer Security
-
Apr
-
T. Bui and T. R. Sivasankaran, “Cost-Effective Modeling for a Decision Support System in Computer Security,” Computers & Security, vol. 6, no. 2, Apr. 1987, pp. 139-151.
-
(1987)
Computers & Security
, vol.6
, Issue.2
, pp. 139-151
-
-
Bui, T.1
Sivasankaran, T.R.2
-
9
-
-
84976742023
-
Representation and Utilization of Non-Functional Requirements for Information System Design.
-
In R. Anderson, J. A. Bubenko, Jr., A. Sølvberg (Eds.),, Proc, 3rd Int. Conf. CAiSE '91, Trondheim, Norway, May 13-15, 1991. Berlin: Springer-Verlag
-
L. Chung, “Representation and Utilization of Non-Functional Requirements for Information System Design.” In R. Anderson, J. A. Bubenko, Jr., A. Sølvberg (Eds.), Advanced Information Systems Eng., Proc, 3rd Int. Conf. CAiSE '91, Trondheim, Norway, May 13-15, 1991. Berlin: Springer-Verlag, 1991, pp. 5-30.
-
(1991)
Advanced Information Systems Eng.
, pp. 5-30
-
-
Chung, L.1
-
10
-
-
1242330098
-
From Information System Requirements to Designs: A Mapping Framework
-
K. L. Chung, P. Katalagarianos, M. Marakakis, M. Mertikas, J. Mylopoulos and Y. Vassiliou, “From Information System Requirements to Designs: A Mapping Framework,” Information Systems, vol. 16, no. 4, 1991, pp. 429-461.
-
(1991)
Information Systems
, vol.16
, Issue.4
, pp. 429-461
-
-
Chung, K.L.1
Katalagarianos, P.2
Marakakis, M.3
Mertikas, M.4
Mylopoulos, J.5
Vassiliou, Y.6
-
11
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
D. D. Clark and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” Proc. IEEE Symp. Security and Privacy, 1987, pp. 184-194.
-
(1987)
Proc. IEEE Symp. Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
12
-
-
0024915716
-
Software Methodology for Development of a Trusted BMS: Identification of Critical Problems
-
Tucson, Arizona, Dec. 4-8
-
S. D. Crocker, “Software Methodology for Development of a Trusted BMS: Identification of Critical Problems,” 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4-8, 1989, pp. 148-165.
-
(1989)
5th Annual Computer Security Appl. Conf.
, pp. 148-165
-
-
Crocker, S.D.1
-
14
-
-
33646196603
-
Goal-directed Requirements Acquisition
-
Como, Italy
-
A. Dardenne, A. van Lamsweerde and S. Fickas, “Goal-directed Requirements Acquisition,” Science of Computer Programming, to appear; earlier version appeared in 6th Int. Workshop on Software Specification and Design, Como, Italy, 1991.
-
(1991)
Science of Computer Programming, to appear; earlier version appeared in 6th Int. Workshop on Software Specification and Design
-
-
Dardenne, A.1
van Lamsweerde, A.2
Fickas, S.3
-
15
-
-
0025023290
-
The Deductive Theory Manager: A Knowledge Based System for Formal Verification
-
B. Di Vito, C. Garvey, D. Kwong, A. Murray, J. Solomon and A. Wu, “The Deductive Theory Manager: A Knowledge Based System for Formal Verification,” Proc. IEEE Symp. Security and Privacy, 1990, pp. 306-318.
-
(1990)
Proc. IEEE Symp. Security and Privacy
, pp. 306-318
-
-
Di Vito, B.1
Garvey, C.2
Kwong, D.3
Murray, A.4
Solomon, J.5
Wu, A.6
-
18
-
-
0026155024
-
Teamwork Support in a Knowledge-Based Information Systems Environment
-
May
-
U. Hahn, M. Jarke and T. Rose, “Teamwork Support in a Knowledge-Based Information Systems Environment,” IEEE Trans. Software Eng., vol. 17, no. 5, May 1991, pp. 467-482
-
(1991)
IEEE Trans. Software Eng.
, vol.17
, Issue.5
, pp. 467-482
-
-
Hahn, U.1
Jarke, M.2
Rose, T.3
-
19
-
-
0017215271
-
Full Protection Specification in the Semantic Model for Database Protection Languages
-
Houston, TX, Oct
-
H. R. Hartson and D. K. Hsiao, “Full Protection Specification in the Semantic Model for Database Protection Languages,” Proc. ACM Annual Conf., Houston, TX, Oct. 1976, pp. 90-95.
-
(1976)
Proc. ACM Annual Conf.
, pp. 90-95
-
-
Hartson, H.R.1
Hsiao, D.K.2
-
22
-
-
0026448404
-
DAIDA: An Environment for Evolving Information Systems
-
Jan
-
M. Jarke, J. Mylopoulos, J. W. Schmidt, Y. Vassiliou, “DAIDA: An Environment for Evolving Information Systems,” ACM Trans. Information Systems, vol. 10, no. 1, Jan. 1992, pp. 1-50.
-
(1992)
ACM Trans. Information Systems
, vol.10
, Issue.1
, pp. 1-50
-
-
Jarke, M.1
Mylopoulos, J.2
Schmidt, J.W.3
Vassiliou, Y.4
-
24
-
-
85026464109
-
Theories Underlying Requirements Engineering: An Overview of NATURE at Genesis
-
Jan
-
M. Jarke, J. Bubenko, C. Rolland, A. Sutcliffe and Y. Vassiliou, “Theories Underlying Requirements Engineering: An Overview of NATURE at Genesis,” IEEE Int. Symp. Requirements Eng., Jan. 1993, pp. 19-31.
-
(1993)
IEEE Int. Symp. Requirements Eng.
, pp. 19-31
-
-
Jarke, M.1
Bubenko, J.2
Rolland, C.3
Sutcliffe, A.4
Vassiliou, Y.5
-
25
-
-
35648956628
-
-
Tech. Report CSRI-272, Computer Systems Research Institute, Univ. of Toronto, May 31
-
E. S. Lee, P. I. P. Boulton, B. W. Thomson, and R. E. Soper, Composable Trusted Systems, Tech. Report CSRI-272, Computer Systems Research Institute, Univ. of Toronto, May 31, 1992.
-
(1992)
Composable Trusted Systems
-
-
Lee, E.S.1
Boulton, P.I.P.2
Thomson, B.W.3
Soper, R.E.4
-
26
-
-
84976787415
-
-
Ph.D. Thesis, MIT
-
J. Lee, A Decision Rationale Management System: Capturing, Reusing, and Managing the Reasons for Decisions, Ph.D. Thesis, MIT, 1992.
-
(1992)
A Decision Rationale Management System: Capturing, Reusing, and Managing the Reasons for Decisions
-
-
Lee, J.1
-
27
-
-
0024883946
-
A Risk Driven Process Model for the Development of Trusted Systems
-
Tucson, Arizona, Dec. 4-8
-
A. Marmor-Squires, B. Danner, J. McHugh, L. Nagy, D. Sterne, M. Branstad, and P. Rougeau, “A Risk Driven Process Model for the Development of Trusted Systems,” 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4-8, 1989, pp. 184-192.
-
(1989)
5th Annual Computer Security Appl. Conf.
, pp. 184-192
-
-
Marmor-Squires, A.1
Danner, B.2
McHugh, J.3
Nagy, L.4
Sterne, D.5
Branstad, M.6
Rougeau, P.7
-
28
-
-
0022593664
-
Another Look at the Use of Noise Addition for Database Security
-
N. S. Matloff, “Another Look at the Use of Noise Addition for Database Security,” Proc. IEEE Symp. Security and Privacy, 1986, pp. 173-180.
-
(1986)
Proc. IEEE Symp. Security and Privacy
, pp. 173-180
-
-
Matloff, N.S.1
-
29
-
-
53349099913
-
The Pareto Principle Applied to Software Quality Assurance
-
In G. Gordon Schulmeyer and James I. McManus (Eds.),, New York: Van Nostrand Reinhold
-
T. J. McCabe and G. G. Schulmeyer, “The Pareto Principle Applied to Software Quality Assurance,” In G. Gordon Schulmeyer and James I. McManus (Eds.), Handbook of Software Quality Assurance, New York: Van Nostrand Reinhold, 1987, pp. 178-210.
-
(1987)
Handbook of Software Quality Assurance
, pp. 178-210
-
-
McCabe, T.J.1
Schulmeyer, G.G.2
-
30
-
-
0023965320
-
The Source of Authority for Commercial Access Control
-
Feb
-
J. D. Moffett and M. S. Sloman, “The Source of Authority for Commercial Access Control,” IEEE Computer, vol. 21, no. 2, Feb. 1988, pp. 59-69.
-
(1988)
IEEE Computer
, vol.21
, Issue.2
, pp. 59-69
-
-
Moffett, J.D.1
Sloman, M.S.2
-
31
-
-
0025498594
-
Telos: Representing Knowledge about Information Systems
-
Oct
-
J. Mylopoulos, A. Borgida, M. Jarke, and M. Koubarakis, “Telos: Representing Knowledge about Information Systems,” ACM Trans. Information Systems, vol. 8, Oct. 1990, pp. 325-362.
-
(1990)
ACM Trans. Information Systems
, vol.8
, pp. 325-362
-
-
Mylopoulos, J.1
Borgida, A.2
Jarke, M.3
Koubarakis, M.4
-
32
-
-
0026883734
-
Representing and Using Non-Functional Requirements: A Process-Oriented Approach
-
June
-
J. Mylopoulos, L. Chung and B. Nixon, “Representing and Using Non-Functional Requirements: A Process-Oriented Approach,” IEEE Trans. Software Eng., vol. 18, no. 6, June 1992, pp. 483-497.
-
(1992)
IEEE Trans. Software Eng.
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
33
-
-
2142703299
-
On Hierarchical Designs of Computer Systems for Critical Applications
-
SE-12, no. 9, Sept
-
P. G. Neumann, “On Hierarchical Designs of Computer Systems for Critical Applications,” IEEE Trans. Software Eng., SE-12, no. 9, Sept. 1986, pp. 905-920.
-
(1986)
IEEE Trans. Software Eng.
, pp. 905-920
-
-
Neumann, P.G.1
-
34
-
-
45949101714
-
Illustrative Risks to the Public in the Use of Computer Systems and Related Technology
-
Jan
-
P. G. Neumann (compiler), “Illustrative Risks to the Public in the Use of Computer Systems and Related Technology,” ACM Software Eng. Notes, vol. 16, no. 1, Jan. 1991, pp. 2-9.
-
(1991)
ACM Software Eng. Notes
, vol.16
, Issue.1
, pp. 2-9
-
-
Neumann, P.G.1
-
36
-
-
33749909775
-
Dealing with Performance Requirements During the Development of Information Systems
-
Jan
-
B. Nixon, “Dealing with Performance Requirements During the Development of Information Systems”, IEEE Int. Symp. Requirements Eng., Jan. 1993, pp. 42-49.
-
(1993)
IEEE Int. Symp. Requirements Eng.
, pp. 42-49
-
-
Nixon, B.1
-
37
-
-
0021425587
-
The Many Faces of Data Vulnerability
-
May
-
D. B. Parker, “The Many Faces of Data Vulnerability,” IEEE Spectrum, vol. 21, no. 5, May 1984, pp. 46-49.
-
(1984)
IEEE Spectrum
, vol.21
, Issue.5
, pp. 46-49
-
-
Parker, D.B.1
-
39
-
-
0021425586
-
Can Computer Crime be Stopped?
-
May
-
T. S. Perry and P. Wallich, “Can Computer Crime be Stopped?", IEEE Spectrum, Vol. 21, No. 5, May 1984, pp. 34-45.
-
(1984)
IEEE Spectrum
, vol.21
, Issue.5
, pp. 34-45
-
-
Perry, T.S.1
Wallich, P.2
-
43
-
-
0024908746
-
Multilevel Secure Database Design: A Practical Application
-
Tucson, Arizona, Dec. 4-8
-
G. W. Smith, “Multilevel Secure Database Design: A Practical Application,” 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4-8, 1989, pp. 314- 321.
-
(1989)
5th Annual Computer Security Appl. Conf.
, pp. 314-321
-
-
Smith, G.W.1
-
44
-
-
85028877311
-
Design Aspects of Access Control in a Knowledge Base System
-
Paris, March
-
G. Steinke, “Design Aspects of Access Control in a Knowledge Base System,” SECURICOM '90, Paris, March, 1990.
-
(1990)
SECURICOM '90
-
-
Steinke, G.1
-
46
-
-
0009708727
-
Integrating Security Activities Into the Software Development Life Cycle and the Software Quality Assurance Process
-
Sept
-
F. G. Tompkins and R. Rice, “Integrating Security Activities Into the Software Development Life Cycle and the Software Quality Assurance Process,” Computers & Security, vol. 5, no. 3, Sept. 1986, pp. 218-242.
-
(1986)
Computers & Security
, vol.5
, Issue.3
, pp. 218-242
-
-
Tompkins, F.G.1
Rice, R.2
-
47
-
-
85031917305
-
IRIS - A Mapping Assistant for Generating Designs from Requirements.
-
Stockholm, May 1991. Berlin: Springer-Verlag
-
Y. Vassiliou, M. Marakakis, P. Katalagarianos, L. Chung, M. Mertikas and J. Mylopoulos, “IRIS - A Mapping Assistant for Generating Designs from Requirements.” In Proc, CAiSE '90, 2nd Nordic Conf. Advanced Information Systems Eng., Stockholm, May 1991. Berlin: Springer-Verlag, 1991, pp. 307-338.
-
(1991)
Proc, CAiSE '90, 2nd Nordic Conf. Advanced Information Systems Eng.
, pp. 307-338
-
-
Vassiliou, Y.1
Marakakis, M.2
Katalagarianos, P.3
Chung, L.4
Mertikas, M.5
Mylopoulos, J.6
-
49
-
-
0019145446
-
Data Base Security: Requirements, Policies, and Models
-
C. Wood, E. B. Fernandez and R. C. Summers, “Data Base Security: Requirements, Policies, and Models,” IBM Syst. J., vol. 19, no. 2, 1980, pp. 229-252.
-
(1980)
IBM Syst. J.
, vol.19
, Issue.2
, pp. 229-252
-
-
Wood, C.1
Fernandez, E.B.2
Summers, R.C.3
|