ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

Organizational Modeling for Efficient Specification of Information Security Requirements.

Jussipekka Leiwo, Chandana Gamage, Yuliang Zheng: Organizational Modeling for Efficient Specification of Information Security Requirements. ADBIS 1999: 247-260
@inproceedings{DBLP:conf/adbis/LeiwoGZ99,
  author    = {Jussipekka Leiwo and
               Chandana Gamage and
               Yuliang Zheng},
  editor    = {Johann Eder and
               Ivan Rozman and
               Tatjana Welzer},
  title     = {Organizational Modeling for Efficient Specification of Information
               Security Requirements},
  booktitle = {Advances in Databases and Information Systems, Third East European
               Conference, ADBIS'99, Maribor, Slovenia, September 13-16, 1999,
               Proceedings},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {1691},
  year      = {1999},
  isbn      = {3-540-66485-8},
  pages     = {247-260},
  ee        = {db/conf/adbis/LeiwoGZ99.html, http://link.springer.de/link/service/series/0558/bibs/1691/16910247.htm},
  crossref  = {DBLP:conf/adbis/99},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 5 Issue 2, JACM, VLDB-J, POS, ..." and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Online Edition: Springer LINK

Citation Page BibTeX

References

[1]
Alison Anderson, Dennis Longley, Lam-for Kwok: Security Modelling for Organisations. ACM Conference on Computer and Communications Security 1994: 241-250 BibTeX
[2]
...
[3]
...
[4]
...
[5]
Richard Baskerville: Information Systems Security Design Methods: Implications for Information Systems Development. ACM Comput. Surv. 25(4): 375-414(1993) BibTeX
[6]
...
[7]
...
[8]
...
[9]
...
[10]
...
[11]
...
[12]
...
[13]
C. A. R. Hoare: Communicating Sequential Processes. Prentice-Hall 1985, ISBN 0-13-153271-5
BibTeX
[14]
...
[15]
...
[16]
...
[17]
...
[18]
...
[19]
...
[20]
...
[21]
...
[22]
...
[23]
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47(1996) BibTeX
[24]
...
[25]
...
[26]
...
[27]
...
[28]
...
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
ADBIS 1999 Proceedings, Lecture Notes in Computer Science: Copyright © by Springer
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 22:56:40 2009