|
Search the dblp DataBase
Charles B. Haley:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Neil B. Cohen, Charles B. Haley, Scott Henderson, Chak Won
Gemini - A reliable Local Network. [Citation Graph (1, 0)][DBLP] Berkeley Workshop, 1982, pp:1-22 [Conf]
- Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
Deriving security requirements from crosscutting threat descriptions. [Citation Graph (0, 0)][DBLP] AOSD, 2004, pp:112-121 [Conf]
- Victor Page, Robin C. Laney, Maurice Dixon, Charles B. Haley
Trust Obstacle Mitigation for Database Systems. [Citation Graph (0, 0)][DBLP] BNCOD, 2006, pp:254-257 [Conf]
- Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP] iTrust, 2004, pp:347-354 [Conf]
- Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
The Effect of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP] RE, 2004, pp:102-111 [Conf]
- Susan L. Graham, Charles B. Haley, William N. Joy
Practical LR error recovery. [Citation Graph (0, 0)][DBLP] SIGPLAN Symposium on Compiler Construction, 1979, pp:168-175 [Conf]
- Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
Using trust assumptions with security requirements. [Citation Graph (0, 0)][DBLP] Requir. Eng., 2006, v:11, n:2, pp:138-151 [Journal]
A Framework for Developing Feature-Rich Software Systems. [Citation Graph (, )][DBLP]
Using Problem Frames with Distributed Architectures: A Case for Cardinality on Interfaces. [Citation Graph (, )][DBLP]
Tool support for code generation from a UMLsec property. [Citation Graph (, )][DBLP]
Model-Based Argument Analysis for Evolving Security Requirements. [Citation Graph (, )][DBLP]
Securing the Skies: In Requirements We Trust. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|