Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Modern Systems Analysis and Design
Modern Systems Analysis and Design
Developing Internet Security Policy for Organizations
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Information Systems Track—Internet and the Digital Economy - Volume 4
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
Proceedings of the 13th international conference on World Wide Web
Model-Driven Trust Negotiation for Web Services
IEEE Internet Computing
The Journal of Strategic Information Systems
Internet privacy concerns and beliefs about government surveillance - An empirical investigation
The Journal of Strategic Information Systems
An MDA-Based Environment for Generating Access Control Policies
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Authorization enforcement usability case study
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
International Journal of Information Management: The Journal for Information Professionals
The information security policy unpacked: A critical study of the content of university policies
International Journal of Information Management: The Journal for Information Professionals
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
Information Resources Management Journal
Hi-index | 0.00 |
Creating and maintaining effective security strategy and policy for software applications.