Dealing with security requirements during the development of information systems
- 1 January 1993
- book chapter
- Published by Springer Nature
- p. 234-251
- https://doi.org/10.1007/3-540-56777-1_13
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- A security model for object-oriented databasesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Toward an approach to measuring software trustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Data security-threats and countermeasuresIEEE Spectrum, 1992
- DAIDAACM Transactions on Information Systems, 1992
- From information system requirements to designs: A mapping frameworkInformation Systems, 1991
- Teamwork support in a knowledge-based information systems environmentIEEE Transactions on Software Engineering, 1991
- Representation and utilization of non-functional requirements for information system designPublished by Springer Nature ,1991
- Cost-effectiveness modeling for a decision support system in computer securityComputers & Security, 1987
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Full protection specifications in the semantic model for database protection languagesPublished by Association for Computing Machinery (ACM) ,1976