Author: Jonathan D. Moffett
Publication Overview
Publication period start: 1988
Number of co-authors: 11
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Haley,
Charles B.,
Laney,
Robin C.,
Moffett,
Jonathan D.,
Nuseibeh,
Bashar
(2006):
Using trust assumptions with security requirements.
In
Requir. Eng.,
11
(2)
pp. 138-151.
https://dx.doi.org/10.1007/s00766-005-0023-4
Moffett,
Jonathan D.,
Hall,
Jon G.,
Coombes,
Andrew,
McDermid,
John A.
(1996):
A Model for a Causal Logic for Requirements Engineering.
In
Requir. Eng.,
1
(1)
pp. 27-46.
https://
Moffett,
Jonathan D.,
Sloman,
Morris S.
(1994):
Policy Conflict Analysis in Distributed System Management.
In
Journal of Organizational Computing,
4
(1)
pp. 1-22.
Moffett,
Jonathan D.,
Sloman,
Morris S.
(1991):
The Representation of Policies as System Objects.
In:
Jong,
Peter de
(eds.)
Proceedings of the Conference on Organizational Computing Systems 1991
November 6-8,
1991,
Atlanta, Georgia, USA.
pp. 171-184.
https://www.acm.org/pubs/articles/proceedings/cocs/122831/p171-moffett/p171-moffett.pdf
Moffett,
Jonathan D.,
Sloman,
Morris
(1988):
The Source of Authority for Commercial Access Control.
In
IEEE Computer,
21
(2)
pp. 59-69.
Haley,
Charles B.,
Laney,
Robin C.,
Moffett,
Jonathan D.,
Nuseibeh,
Bashar
(2004):
The Effect of Trust Assumptions on the Elaboration of Security Requirements.
In:
12th IEEE International Conference on Requirements Engineering RE 2004
6-10 September,
2004,
Kyoto, Japan.
pp. 102-111.
https://doi.ieeecomputersociety.org/10.1109/RE.2004.50
Lin,
Luncheng,
Nuseibeh,
Bashar,
Ince,
Darrel C.,
Jackson,
Michael,
Moffett,
Jonathan D.
(2003):
Introducing Abuse Frames for Analysing Security Requirements.
In:
11th IEEE International Conference on Requirements Engineering RE 2003
8-12 September,
2003,
Monterey Bay, CA, USA.
pp. 371-372.
https://csdl.computer.org/comp/proceedings/re/2003/1980/00/19800371abs.htm