2008 |
33 | EE | Charles B. Haley,
Robin C. Laney,
Jonathan D. Moffett,
Bashar Nuseibeh:
Security Requirements Engineering: A Framework for Representation and Analysis.
IEEE Trans. Software Eng. 34(1): 133-153 (2008) |
2006 |
32 | EE | Charles B. Haley,
Robin C. Laney,
Jonathan D. Moffett,
Bashar Nuseibeh:
Using trust assumptions with security requirements.
Requir. Eng. 11(2): 138-151 (2006) |
2004 |
31 | EE | Arosha K. Bandara,
Emil Lupu,
Jonathan D. Moffett,
Alessandra Russo:
A Goal-based Approach to Policy Refinement.
POLICY 2004: 229-239 |
30 | EE | Charles B. Haley,
Robin C. Laney,
Jonathan D. Moffett,
Bashar Nuseibeh:
The Effect of Trust Assumptions on the Elaboration of Security Requirements.
RE 2004: 102-111 |
29 | EE | Andreas Schaad,
Jonathan D. Moffett:
Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles.
SAC 2004: 1380-1384 |
28 | EE | Charles B. Haley,
Robin C. Laney,
Jonathan D. Moffett,
Bashar Nuseibeh:
Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements.
iTrust 2004: 347-354 |
2003 |
27 | EE | Luncheng Lin,
Bashar Nuseibeh,
Darrel C. Ince,
Michael Jackson,
Jonathan D. Moffett:
Introducing Abuse Frames for Analysing Security Requirements.
RE 2003: 371-372 |
26 | EE | Axel Kern,
Andreas Schaad,
Jonathan D. Moffett:
An administration concept for the enterprise role-based access control model.
SACMAT 2003: 3-11 |
25 | | Hanan Lutfiyya,
Francisco Garcia,
Jonathan D. Moffett:
Policy 2003: Workshop on Policies for Distributed Systems and Networks.
J. Network Syst. Manage. 11(3): (2003) |
2002 |
24 | EE | Andreas Schaad,
Jonathan D. Moffett:
A Framework for Organisational Control Principles.
ACSAC 2002: 229-238 |
23 | EE | Andreas Schaad,
Jonathan D. Moffett:
Delegation of Obligations.
POLICY 2002: 25-35 |
22 | EE | Andreas Schaad,
Jonathan D. Moffett:
A lightweight approach to specification and analysis of role-based access control extensions.
SACMAT 2002: 13-22 |
21 | EE | Elisa Bertino,
Trent Jaeger,
Jonathan D. Moffett,
Sylvia L. Osborn,
Ravi Ravi:
Making access control more usable.
SACMAT 2002: 141 |
20 | EE | Axel Kern,
Martin Kuhlmann,
Andreas Schaad,
Jonathan D. Moffett:
Observations on the role life-cycle in the context of enterprise security management.
SACMAT 2002: 43-51 |
2001 |
19 | EE | Andreas Schaad,
Jonathan D. Moffett,
Jeremy Jacob:
The role-based access control system of a European bank: a case study and discussion.
SACMAT 2001: 3-9 |
2000 |
18 | EE | Richard Evans,
Jonathan D. Moffett:
Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems.
SAFECOMP 2000: 240-249 |
17 | | Jonathan D. Moffett,
Andrew Vickers:
Behavioural Conflicts in a Causal Specification.
Autom. Softw. Eng. 7(3): 215-238 (2000) |
1999 |
16 | EE | Jonathan D. Moffett,
Emil Lupu:
The Uses of Role Hierarchies in Access Control.
ACM Workshop on Role-Based Access Control 1999: 153-160 |
15 | EE | David Peter Eames,
Jonathan D. Moffett:
The Integration of Safety and Security Requirements.
SAFECOMP 1999: 468-480 |
1998 |
14 | EE | Jonathan D. Moffett:
Control Principles and Role Hierarchies.
ACM Workshop on Role-Based Access Control 1998: 63-69 |
1996 |
13 | | Jonathan D. Moffett,
Jon G. Hall,
Andrew Coombes,
John A. McDermid:
A Model for a Causal Logic for Requirements Engineering.
Requir. Eng. 1(1): 27-46 (1996) |
1995 |
12 | EE | Marshall D. Abrams,
Jonathan D. Moffett:
A higher level of computer security through active policies.
Computers & Security 14(2): 147-157 (1995) |
1993 |
11 | | Dirk Jonscher,
Jonathan D. Moffett,
Klaus R. Dittrich:
Complex Subjects, or: The Striving for Complexity is Ruling our World.
DBSec 1993: 19-37 |
10 | | Morris Sloman,
Barry J. Varley,
Jonathan D. Moffett,
Kevin P. Twidle:
Domain Management and Accounting in an International Cellular Network.
Integrated Network Management 1993: 193-206 |
9 | | Susan Barry,
Patricia McQuillan,
Michael Purser,
Jonathan D. Moffett:
Implementing and Proving Security Services for the RARE/COSINE Community.
Computer Networks and ISDN Systems 26(3): 263-267 (1993) |
8 | EE | Jonathan D. Moffett,
Morris Sloman:
User and mechanism views of distributed systems management.
Distributed Systems Engineering 1(1): 37-47 (1993) |
7 | | Jonathan D. Moffett,
Morris Sloman:
Policies Hierarchies for Distributed Systems Management.
IEEE Journal on Selected Areas in Communications 11(9): 1404-1414 (1993) |
1991 |
6 | EE | Jonathan D. Moffett,
Morris Sloman:
The representation of policies as system objects.
COOCS 1991: 171-184 |
5 | | Jonathan D. Moffett,
Morris Sloman:
Content-Dependent Access Control.
Operating Systems Review 25(2): 63-70 (1991) |
1990 |
4 | | Jonathan D. Moffett,
Morris Sloman:
A Case Study in Representing a Model: to Z or not to Z?
Z User Workshop 1990: 254-268 |
3 | EE | Jonathan D. Moffett,
Morris Sloman,
Kevin P. Twidle:
Specifying discretionary access control policy for distributed systems.
Computer Communications 13(9): 571-580 (1990) |
1988 |
2 | EE | Morris Sloman,
Jonathan D. Moffett:
Domain model of autonomy.
ACM SIGOPS European Workshop 1988 |
1 | | Jonathan D. Moffett,
Morris Sloman:
The Source of Authority for Commercial Access Control.
IEEE Computer 21(2): 59-69 (1988) |