2009 journal article

Requirements-based Access Control Analysis and Policy Specification (ReCAPS)

INFORMATION AND SOFTWARE TECHNOLOGY, 51(6), 993–1009.

By: Q. He* & A. Anton n

author keywords: Requirements analysis; Security; Access control
TL;DR: The ReCAPS method integrates policy specification into the software development process, ensures consistency across software artifacts, and provides prescriptive guidance for how to specify ACPs, improving the quality of requirements specifications and system designs. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2004 journal article

Financial privacy policies and the need for standardization

IEEE SECURITY & PRIVACY, 2(2), 36–45.

By: A. Anton n, J. Earp n, Q. He n, W. Stufflebeam n, D. Bolchini* & C. Jensen*

TL;DR: The authors analyze 40 online privacy policy documents from nine financial institutions to examine their clarity and readability and show that compliance with the existing legislation and standards is, at best, questionable. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2004 journal article

Inside JetBlue's privacy policy violations

IEEE Security & Privacy, 2(6), 18-.

By: A. Anton, Q. He & D. Baumer

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.