Functional Requirements for Secure Code: The Reference Monitor and Use Case.
Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2
-
- €2.99
-
- €2.99
Publisher Description
INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).
Information Security Management Systems
2018
Collaborative Approaches for Cyber Security in Cyber-Physical Systems
2023
Access Control Management in Cloud Environments
2020
Cyber-Assurance for the Internet of Things
2016
ISSE 2009 Securing Electronic Business Processes
2010
Privacy and Identity Management. Between Data Protection and Security
2022
Sarbanes-Oxley Compliance: New Opportunities for Information Technology Professionals (Public Company Accounting Oversight Board)
2007
Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics.
1999
E-Commerce Security Standards and Loopholes (Manuscripts)
2000
Customer Relationship Management Strategies for the Internet (Company Overview)
2001
Toward an Understanding of MIS Survey Research Methodology: Current Practices, Trends, And Implications for Future Research (Manuscripts)
2003
Production & Operations Quality Concepts: Deficient Diffusion Into the Service Sector (Manuscripts)
2004