Jonathan D. Moffett

According to our database1, Jonathan D. Moffett authored at least 38 papers between 1988 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2008
Security Requirements Engineering: A Framework for Representation and Analysis.
IEEE Trans. Software Eng., 2008

2006
Using trust assumptions with security requirements.
Requir. Eng., 2006

A framework for security requirements engineering.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

2004
Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

The Effect of Trust Assumptions on the Elaboration of Security Requirements.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

A Goal-based Approach to Policy Refinement.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements.
Proceedings of the Trust Management, Second International Conference, 2004

2003
Policy 2003: Workshop on Policies for Distributed Systems and Networks.
J. Netw. Syst. Manag., 2003

An administration concept for the enterprise role-based access control model.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Introducing Abuse Frames for Analysing Security Requirements.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

2002
A lightweight approach to specification and analysis of role-based access control extensions.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Observations on the role life-cycle in the context of enterprise security management.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Making access control more usable.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Delegation of Obligations.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

A Framework for Organisational Control Principles.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
The role-based access control system of a European bank: a case study and discussion.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

2000
Behavioural Conflicts in a Causal Specification.
Autom. Softw. Eng., 2000

Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems.
Proceedings of the Computer Safety, 2000

1999
The Integration of Safety and Security Requirements.
Proceedings of the Computer Safety, 1999

The Uses of Role Hierarchies in Access Control.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

1998
Control Principles and Role Hierarchies.
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998

1996
A Model for a Causal Logic for Requirements Engineering.
Requir. Eng., 1996

1995
A higher level of computer security through active policies.
Comput. Secur., 1995

Requirements Analysis and Safety: A Case Study (using GRASP).
Proceedings of the 14th International Conference on Computer Safety, 1995

1993
Policies Hierarchies for Distributed Systems Management.
IEEE J. Sel. Areas Commun., 1993

User and mechanism views of distributed systems management.
Distributed Syst. Eng., 1993

Implementing and Proving Security Services for the RARE/COSINE Community.
Comput. Networks ISDN Syst., 1993

Domain Management and Accounting in an International Cellular Network.
Proceedings of the Integrated Network Management III, 1993

Complex Subjects, or: The Striving for Complexity is Ruling our World.
Proceedings of the Database Security, 1993

Applying noninterference to composition of systems: a more practical approach.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1991
Content-Dependent Access Control.
ACM SIGOPS Oper. Syst. Rev., 1991

Computer representation of management policy.
J. Inf. Technol., 1991

The representation of policies as system objects.
Proceedings of the Conference on Organizational Computing Systems, 1991

1990
Delegation of authority using domain-based access rules.
PhD thesis, 1990

Specifying discretionary access control policy for distributed systems.
Comput. Commun., 1990

A Case Study in Representing a Model: to Z or not to Z?
Proceedings of the Z User Workshop, 1990

1988
The Source of Authority for Commercial Access Control.
Computer, 1988

Domain model of autonomy.
Proceedings of the 3rd ACM SIGOPS European Workshop: Autonomy or Interdependence in Distributed Systems? Cambridge, 1988


  Loading...