Functional Requirements for Secure Code: The Reference Monitor and Use Case. Functional Requirements for Secure Code: The Reference Monitor and Use Case.

Functional Requirements for Secure Code: The Reference Monitor and Use Case‪.‬

Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2

    • ‏5٫99 US$
    • ‏5٫99 US$

وصف الناشر

INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٩
١ يناير
اللغة
EN
الإنجليزية
عدد الصفحات
٨
الناشر
The DreamCatchers Group, LLC
البائع
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
الحجم
٢٧٠٫٥
ك.ب.
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
٢٠٠٧
Information and Cyber Security Information and Cyber Security
٢٠٢٠
Information Security Management Systems Information Security Management Systems
٢٠١٨
Integrating a Usable Security Protocol into User Authentication Services Design Process Integrating a Usable Security Protocol into User Authentication Services Design Process
٢٠١٨
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
٢٠١٧
Privacy Technologies and Policy Privacy Technologies and Policy
٢٠١٦
Employee Performance Evaluation Using the Analytic Hierarchy Process (Manuscripts) Employee Performance Evaluation Using the Analytic Hierarchy Process (Manuscripts)
٢٠٠٣
Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning) Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning)
٢٠٠٦
The Ebay Factor: The Online Auction Solution to the Riddle of Reverse Logistics (Manuscripts) The Ebay Factor: The Online Auction Solution to the Riddle of Reverse Logistics (Manuscripts)
٢٠٠٥
Six Sigma and Innovation (Manuscripts) Six Sigma and Innovation (Manuscripts)
٢٠٠٣
E-Commerce Security Standards and Loopholes (Manuscripts) E-Commerce Security Standards and Loopholes (Manuscripts)
٢٠٠٠
Customer Relationship Management Strategies for the Internet (Company Overview) Customer Relationship Management Strategies for the Internet (Company Overview)
٢٠٠١