共 34 条
[1]
Abbas H., Yngstrom L., Hemani A., Security evaluation of IT products: bridging the gap between common criteria (CC) and real option thinking, Proceedings of the World Congress on Engineering and Computer Science 2008, San Francisco, CA, USA, 22-24 October, pp. 530-533, (2008)
[2]
Abbas H., Magnusson C., Yngstrom L., Hemani A., A structured approach for internalizing externalities caused by IT security mechanisms, Proceedings of the IEEE International Workshop on Education Technology and Computer Science, Wuhan, China, 6-7 March, (2010)
[3]
Abbas H., Yngstrom L., Hemani A., Adaptability infrastructure for bridging IT security evaluation and options theory, Proceedings of the 2nd IEEE/ACM International Conference on Security of Information and Networks (SIN 2009), Gazimagusa, 6-10 October, pp. 39-45, (2009)
[4]
Abbas H., Yngstrom L., Hemani A., Empowering security evaluation of IT products with options theory, (2009)
[5]
Abbas H., Yngstrom L., Hemani A., Option based evaluation: security evaluation of IT products based on options theory, Proceedings of IEEE Eastern European Regional Conference on the Engineering of Computer Based Systems, Novi Sad, Serbia, 7-8 September, pp. 134-141, (2009)
[6]
Brynjolfsson E., Yang S., Information technology and productivity: a review of the literature, Advances in Computers, 43, pp. 179-214, (1996)
[7]
Byrnes C., Kyratzoglou L., Applying architecture tradeoff assessment method (ATAM) as part of formal software architecture review, (2008)
[8]
CRA Members, 2009, (2009)
[9]
Introduction and general model, (2009)
[10]
Cavoukian A., Privacy as a negative externality the solution: privacy by design, Proceedings of Workshop on the Economics of Information Security, London, UK, (2009)