Author of the publication

A Standard Methodology for Embedding Security Functionality Within Formal Specifications of Requirements.

, , and . AMCIS, page 180. Association for Information Systems, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat Modeling the Enterprise., , , and . AMCIS, page 133. Association for Information Systems, (2008)A Standard Methodology for Embedding Security Functionality Within Formal Specifications of Requirements., , and . AMCIS, page 180. Association for Information Systems, (2004)Data Mining and the Five Pillars of Information Assurance: Where Does Society Draw the Line?, , and . AMCIS, page 460. Association for Information Systems, (2005)A case for the study of software management within a broad information technology curriculum., , and . CITC, page 174-179. ACM, (2003)A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work., , , and . COMPSAC (1), page 644-645. IEEE Computer Society, (2009)Integrating Secure Software Assurance Content with SE2004 Recommendations., , , and . CSEE&T, page 59-66. IEEE Computer Society, (2008)A Comparison of the Software Assurance Common Body of Knowledge to Common Curricular Standards., , , and . CSEE&T, page 149-156. IEEE Computer Society, (2007)An Immersion Program to Help Students Understand the Impact of Cross Cultural Differences in Software Engineering Work., , , and . COMPSAC, page 455-459. IEEE Computer Society, (2008)