Functional Requirements for Secure Code: The Reference Monitor and Use Case. Functional Requirements for Secure Code: The Reference Monitor and Use Case.

Functional Requirements for Secure Code: The Reference Monitor and Use Case‪.‬

Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2

    • €2.99
    • €2.99

Publisher Description

INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).

GENRE
Computing & Internet
RELEASED
2009
1 January
LANGUAGE
EN
English
LENGTH
8
Pages
PUBLISHER
The DreamCatchers Group, LLC
PROVIDER INFO
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
270.5
KB
Information Security Management Systems Information Security Management Systems
2018
Collaborative Approaches for Cyber Security in Cyber-Physical Systems Collaborative Approaches for Cyber Security in Cyber-Physical Systems
2023
Access Control Management in Cloud Environments Access Control Management in Cloud Environments
2020
Cyber-Assurance for the Internet of Things Cyber-Assurance for the Internet of Things
2016
ISSE 2009 Securing Electronic Business Processes ISSE 2009 Securing Electronic Business Processes
2010
Privacy and Identity Management. Between Data Protection and Security Privacy and Identity Management. Between Data Protection and Security
2022
Sarbanes-Oxley Compliance: New Opportunities for Information Technology Professionals (Public Company Accounting Oversight Board) Sarbanes-Oxley Compliance: New Opportunities for Information Technology Professionals (Public Company Accounting Oversight Board)
2007
Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics. Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics.
1999
E-Commerce Security Standards and Loopholes (Manuscripts) E-Commerce Security Standards and Loopholes (Manuscripts)
2000
Customer Relationship Management Strategies for the Internet (Company Overview) Customer Relationship Management Strategies for the Internet (Company Overview)
2001
Toward an Understanding of MIS Survey Research Methodology: Current Practices, Trends, And Implications for Future Research (Manuscripts) Toward an Understanding of MIS Survey Research Methodology: Current Practices, Trends, And Implications for Future Research (Manuscripts)
2003
Production & Operations Quality Concepts: Deficient Diffusion Into the Service Sector (Manuscripts) Production & Operations Quality Concepts: Deficient Diffusion Into the Service Sector (Manuscripts)
2004