-
2
-
-
0001094070
-
The use of the CCTA risk analysis and management methodology CRAMM
-
North Holland
-
Barber, B., & Davey, J. (1992). The use of the CCTA risk analysis and management methodology CRAMM. Proc. MEDINFO92, North Holland (pp. 1589-1593).
-
(1992)
Proc. MEDINFO92
, pp. 1589-1593
-
-
Barber, B.1
Davey, J.2
-
5
-
-
0012035309
-
Structuring use cases with goals
-
Sep/Oct: 35-40, Nov/Dec
-
Cockburn, A. (1997). Structuring use cases with goals. Journal of Object-oriented Programming, Sep/Oct: 35-40, Nov/Dec: 56-62.
-
(1997)
Journal of Object-oriented Programming
, pp. 56-62
-
-
Cockburn, A.1
-
7
-
-
85189807168
-
-
On the World Wide Web
-
Communications-Electronics Security Group. (2002). Information security evaluation criteria. On the World Wide Web:: http://www.cesg.gov.uk/assurance/iacs/itsec/index.htm
-
(2002)
Information security evaluation criteria
-
-
-
8
-
-
85189787736
-
-
Control objectives for information and related technology. COBIT. On the World Wide Web
-
Control objectives for information and related technology. COBIT. On the World Wide Web: http://www.isaca.org/ct_denld.htm
-
-
-
-
10
-
-
85189764605
-
Intrusion detection message exchange format (IDMEF)
-
(December 28)
-
Curry, D., & Debar Merrill Lynch, H. (December 28, 2001). Intrusion detection message exchange format (IDMEF). Working draft.
-
(2001)
Working draft
-
-
Curry, D.1
Debar Merrill Lynch, H.2
-
11
-
-
0003042004
-
Ponder: A language for specifying security and management policies for distributed systems
-
Department of Computing, Imperial College, London
-
Damianou, N., Dulay, N., Lupu, E., & Sloman, M. (2000). Ponder: A language for specifying security and management policies for distributed systems. The Language Specification-Version 2.2. Research Report DoC 2000/1, Department of Computing, Imperial College, London.
-
(2000)
The Language Specification-Version 2.2. Research Report DoC 2000/1
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
12
-
-
63149118000
-
Stochastic models and mobile E-commerce: Are stochastic models usable in the analysis of risk in mobile c-commerce?
-
0stfold University College, Faculty of Computer Sciences, Halden, Norway
-
Houmb, S. H. (2002). Stochastic models and mobile E-commerce: Are stochastic models usable in the analysis of risk in mobile c-commerce? Unpublished Master's Thesis, 0stfold University College, Faculty of Computer Sciences, Halden, Norway.
-
(2002)
Unpublished Master's Thesis
-
-
Houmb, S.H.1
-
15
-
-
85189823689
-
Information technology-Security techniques-
-
ISO/IEC (1999). Information technology-Security techniques-Evaluation Criteria for IT Security ISO/IEC, 15408-1.
-
(1999)
Evaluation Criteria for IT Security ISO/IEC
, pp. 15408-15401
-
-
-
20
-
-
0016444204
-
A reliability model for systems with Markov structure
-
Littlewood, B. (1975). A reliability model for systems with Markov structure. Appl. Stat. 24 (pp. 172-177).
-
(1975)
Appl. Stat. 24
, pp. 172-177
-
-
Littlewood, B.1
-
21
-
-
85189768283
-
-
XML Metadata Interchange (XMI)
-
OMG. (1999). XML Metadata Interchange (XMI).
-
(1999)
-
-
-
24
-
-
85189769673
-
-
Reactive System Design Support, RSDS. On the World Wide Web
-
Reactive System Design Support, RSDS. On the World Wide Web: http://www.dcs.kcl.ac.uk
-
-
-
|