Functional Requirements for Secure Code: The Reference Monitor and Use Case.
Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2
-
- 2,99 €
-
- 2,99 €
Beschreibung des Verlags
INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).
Trust, Privacy and Security in Digital Business
2007
Information and Cyber Security
2020
Information Security Management Systems
2018
Integrating a Usable Security Protocol into User Authentication Services Design Process
2018
Trust, Privacy and Security in Digital Business
2017
Privacy Technologies and Policy
2016
Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning)
2006
Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts)
2003
Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report)
2010
Domain Names and Trademarks--the Unhappy Marriage Continues But the Rules are Clearer.
2001
Sarbanes-Oxley Compliance: New Opportunities for Information Technology Professionals (Public Company Accounting Oversight Board)
2007
Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics.
1999