Author of the publication

Arguing Security: Validating Security Requirements Using Structured Argumentation

, , , and . Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), Paris, (August 2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A higher level of computer security through active policies., and . Comput. Secur., 14 (2): 147-157 (1995)Delegation of authority using domain-based access rules.. Imperial College London, UK, (1990)British Library, EThOS.The role-based access control system of a European bank: a case study and discussion., , and . SACMAT, page 3-9. ACM, (2001)Applying noninterference to composition of systems: a more practical approach., , and . ACSAC, page 210-220. IEEE, (1993)A Framework for Organisational Control Principles., and . ACSAC, page 229-238. IEEE Computer Society, (2002)The Uses of Role Hierarchies in Access Control., and . ACM Workshop on Role-Based Access Control, page 153-160. ACM, (1999)Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements., , , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 347-354. Springer, (2004)Introducing Abuse Frames for Analysing Security Requirements., , , , and . RE, page 371-372. IEEE Computer Society, (2003)Delegation of Obligations., and . POLICY, page 25-35. IEEE Computer Society, (2002)Arguing Security: Validating Security Requirements Using Structured Argumentation, , , and . Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), Paris, (August 2005)