Functional Requirements for Secure Code: The Reference Monitor and Use Case. Functional Requirements for Secure Code: The Reference Monitor and Use Case.

Functional Requirements for Secure Code: The Reference Monitor and Use Case‪.‬

Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2

    • £2.99
    • £2.99

Publisher Description

INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).

GENRE
Computing & Internet
RELEASED
2009
1 January
LANGUAGE
EN
English
LENGTH
8
Pages
PUBLISHER
The DreamCatchers Group, LLC
SIZE
270.5
KB
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2007
Information and Cyber Security Information and Cyber Security
2020
Information Security Management Systems Information Security Management Systems
2018
Integrating a Usable Security Protocol into User Authentication Services Design Process Integrating a Usable Security Protocol into User Authentication Services Design Process
2018
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2017
Privacy Technologies and Policy Privacy Technologies and Policy
2016
Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report) Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report)
2010
Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts) Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts)
2003
E-Commerce Security Standards and Loopholes (Manuscripts) E-Commerce Security Standards and Loopholes (Manuscripts)
2000
Ethics of Computer Use: A Survey of Student Attitudes. Ethics of Computer Use: A Survey of Student Attitudes.
2006
Information Systems Security and Safety Measures: The Dichotomy Between Students' Familiarity and Practice. Information Systems Security and Safety Measures: The Dichotomy Between Students' Familiarity and Practice.
2009
Understanding the Lack of Minority Representation in Graduate Programs in Computer Science and Information Technology: A Focus Group Study of Student Perceptions (Report) Understanding the Lack of Minority Representation in Graduate Programs in Computer Science and Information Technology: A Focus Group Study of Student Perceptions (Report)
2009