Functional Requirements for Secure Code: The Reference Monitor and Use Case.
Academy of Information and Management Sciences Journal 2009, Jan-July, 12, 1-2
-
- US$5.99
-
- US$5.99
출판사 설명
INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security in textbooks and the exclusion of security as a functional requirement (Haworth, 2002, Trimmer, Parker & Schou, 2007).
Trust, Privacy and Security in Digital Business
2007년
Information and Cyber Security
2020년
Information Security Management Systems
2018년
Integrating a Usable Security Protocol into User Authentication Services Design Process
2018년
Trust, Privacy and Security in Digital Business
2017년
Privacy Technologies and Policy
2016년
Employee Performance Evaluation Using the Analytic Hierarchy Process (Manuscripts)
2003년
Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning)
2006년
The Ebay Factor: The Online Auction Solution to the Riddle of Reverse Logistics (Manuscripts)
2005년
Six Sigma and Innovation (Manuscripts)
2003년
E-Commerce Security Standards and Loopholes (Manuscripts)
2000년
Customer Relationship Management Strategies for the Internet (Company Overview)
2001년