-
1
-
-
33746338083
-
-
Carnegie Mellon, Software Engineering Institute, CERT Coordination Centre
-
Alberts C, Dorofee A. OCTAVE Method Implementation Guide Version 2.0. Carnegie Mellon, Software Engineering Institute, CERT Coordination Centre. Available at: http://www.cert.org/octave/download/intro.html.
-
OCTAVE Method Implementation Guide Version 2.0
-
-
Alberts, C.1
Dorofee, A.2
-
2
-
-
1842829828
-
-
National Institute of Standards and Technology (NIST), SP 800-30, January
-
Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST), SP 800-30, January 2002. Available at: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
-
7
-
-
22144449959
-
Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME)
-
Nottingham, U.K., 2003. EPSRC
-
Jackson T, Austin J, Fletcher M, Jessop M. Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME). Proceedings of the UK e-Science All Hands Meeting, Nottingham, U.K., 2003. EPSRC, 2003. Available at: http://www.nesc.ac.uk/events/ahm2003/AHMCD/.
-
(2003)
Proceedings of the UK E-Science All Hands Meeting
-
-
Jackson, T.1
Austin, J.2
Fletcher, M.3
Jessop, M.4
-
9
-
-
22144449238
-
Adapting security risk analysis to service-based systems
-
Oxford, U.K. Technical Report YCS 380, Department of Computer Science, University of York
-
Chivers H, Fletcher M. Adapting security risk analysis to service-based systems. Proceedings of the Grid Security Practice and Experience Workshop, Oxford, U.K. Technical Report YCS 380, Department of Computer Science, University of York, 2004.
-
(2004)
Proceedings of the Grid Security Practice and Experience Workshop
-
-
Chivers, H.1
Fletcher, M.2
-
10
-
-
22144469094
-
Security and systems engineering
-
Department of Computer Science, University of York, June
-
Chivers H. Security and systems engineering. Technical Report YCS 378, Department of Computer Science, University of York, June 2004.
-
(2004)
Technical Report YCS
, vol.378
-
-
Chivers, H.1
-
11
-
-
0038562418
-
-
National Institute of Standards and Technology (NIST), SP 800-12, October
-
An Introduction to Computer Security: The NIST Handbook. National Institute of Standards and Technology (NIST), SP 800-12, October 1995. Available at: http://csrc.nist.gov/publications/nistpubs/800-12/.
-
(1995)
An Introduction to Computer Security: The NIST Handbook
-
-
-
14
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville R. Information systems security design methods: Implications for information systems development. ACM Computing Surveys 1993; 25(4):375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
15
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision-making
-
Straub DW, Welke RJ. Coping with systems risk: Security planning models for management decision-making. MIS Quarterly 1998; 22(4):441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
17
-
-
84941189169
-
-
Insight Consulting Limited
-
CRAMM Risk Assessment Tool Overview. Insight Consulting Limited. Available at: http://www.cramm.com/riskassessment.htm.
-
CRAMM Risk Assessment Tool Overview
-
-
-
20
-
-
0029191009
-
A dealing with non-functional requirements: Three experimental studies of a process-oriented approach
-
Seattle, WA. ACM Press: New York
-
Chung L, Nixon BA. A dealing with non-functional requirements: Three experimental studies of a process-oriented approach. Proceedings of the 17th International Conference on Software Engineering, Seattle, WA. ACM Press: New York, 1995; 25-37.
-
(1995)
Proceedings of the 17th International Conference on Software Engineering
, pp. 25-37
-
-
Chung, L.1
Nixon, B.A.2
-
21
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
Mylopoulos J, Chung L, Nixon B. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Transactions on Software Engineering 1992; 18(6):483-497.
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
23
-
-
4243980729
-
Strategies for developing policies and requirements for secure electronic commerce systems
-
Ghosh AK (ed.). Kluwer Academic Publishers
-
Antón AI, Earp JB. Strategies for developing policies and requirements for secure electronic commerce systems. Recent Advances in Secure and Private E-Commerce, Ghosh AK (ed.). Kluwer Academic Publishers, 2001; 29-46.
-
(2001)
Recent Advances in Secure and Private E-commerce
, pp. 29-46
-
-
Antón, A.I.1
Earp, J.B.2
-
24
-
-
12344314483
-
A framework for security requirements engineering
-
Department of Computer Science, University of York, 20 August
-
Moffett JD, Nuseibeh BA. A framework for security requirements engineering. Technical Report YCS-2003-368, Department of Computer Science, University of York, 20 August 2003.
-
(2003)
Technical Report
, vol.YCS-2003-368
-
-
Moffett, J.D.1
Nuseibeh, B.A.2
-
25
-
-
3042529796
-
Using UML to reflect non-functional requirements
-
Toronto, Ontario, Canada. IBM Press
-
Cysneiros LM, Leite JCSdP. Using UML to reflect non-functional requirements. Proceedings of the 2001 Conference of the Centre for Advanced Studies on Collaborative Research, Toronto, Ontario, Canada. IBM Press, 2001; 202-216.
-
(2001)
Proceedings of the 2001 Conference of the Centre for Advanced Studies on Collaborative Research
, pp. 202-216
-
-
Cysneiros, L.M.1
Leite, J.C.Sd.P.2
-
26
-
-
22144453559
-
Model-based security risk analysis for Web applications: The CORAS approach
-
St Anne's College, Oxford, U.K. (Electronic Workshops in Computing). British Computer Society: Swindon, U.K.
-
Dimitrakos T, Raptis D, Ritchie B, Stølen K. Model-based security risk analysis for Web applications: The CORAS approach. Proceedings of the EuroWeb 2002. St Anne's College, Oxford, U.K. (Electronic Workshops in Computing). British Computer Society: Swindon, U.K., 2002. Available at: http://ewic.bcs.org/conferences/2002/euroweb/index.htm.
-
(2002)
Proceedings of the EuroWeb 2002
-
-
Dimitrakos, T.1
Raptis, D.2
Ritchie, B.3
Stølen, K.4
-
27
-
-
4143114602
-
Model-based risk management using UML and UP
-
Favre L (ed.). IRM Press: Hershey, PA
-
Braber Fd, Dimitrakos T, Gran BA, Lund MS, Stølen K, Aagedal JØ. Model-based risk management using UML and UP. UML and the Unified Process, Favre L (ed.). IRM Press: Hershey, PA, 2003; 332-357.
-
(2003)
UML and the Unified Process
, pp. 332-357
-
-
Braber, Fd.1
Dimitrakos, T.2
Gran, B.A.3
Lund, M.S.4
Stølen, K.5
Aagedal, J.Ø.6
|