Functional Requirements for Secure Code: The Reference Monitor and Use Case.
Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2
-
- £2.99
-
- £2.99
Publisher Description
INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).
Trust, Privacy and Security in Digital Business
2007
Information and Cyber Security
2020
Information Security Management Systems
2018
Integrating a Usable Security Protocol into User Authentication Services Design Process
2018
Trust, Privacy and Security in Digital Business
2017
Privacy Technologies and Policy
2016
Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report)
2010
Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts)
2003
E-Commerce Security Standards and Loopholes (Manuscripts)
2000
Ethics of Computer Use: A Survey of Student Attitudes.
2006
Information Systems Security and Safety Measures: The Dichotomy Between Students' Familiarity and Practice.
2009
Understanding the Lack of Minority Representation in Graduate Programs in Computer Science and Information Technology: A Focus Group Study of Student Perceptions (Report)
2009