Functional Requirements for Secure Code: The Reference Monitor and Use Case.
Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2
-
- 2,99 €
-
- 2,99 €
Publisher Description
INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).
Trust, Privacy and Security in Digital Business
2007
Information and Cyber Security
2020
Information Security Management Systems
2018
Integrating a Usable Security Protocol into User Authentication Services Design Process
2018
Trust, Privacy and Security in Digital Business
2017
Privacy Technologies and Policy
2016
A Social Engineering Project in a Computer Security Course.
2006
Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics.
1999
E-Commerce Security Standards and Loopholes (Manuscripts)
2000
Customer Relationship Management Strategies for the Internet (Company Overview)
2001
Toward an Understanding of MIS Survey Research Methodology: Current Practices, Trends, And Implications for Future Research (Manuscripts)
2003
Production & Operations Quality Concepts: Deficient Diffusion Into the Service Sector (Manuscripts)
2004