-
1
-
-
32044439548
-
Part 1: Introduction and general model
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security. ISO/IEC, Geneva Switzerland, 1 Dec International Standard 15408-1
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security. Part 1: Introduction and general model. International Standard 15408-1, ISO/IEC, Geneva Switzerland, 1 Dec 1999
-
(1999)
-
-
-
2
-
-
0031385980
-
Classification of research efforts in requirements engineering
-
Zave P (1997) Classification of research efforts in requirements engineering. Comput Survey 29(4):315-321
-
(1997)
Comput Survey
, vol.29
, Issue.4
, pp. 315-321
-
-
Zave, P.1
-
4
-
-
85050595861
-
Capturing more world knowledge in the requirements specification
-
Tokyo, 13-16 September 1982
-
Greenspan SJ, Mylopoulos J, Borgida A (1982) Capturing more world knowledge in the requirements specification. Proceedings of the 6th international conference on software engineering (ICSE'82), Tokyo, 13-16 September 1982, pp 225-234
-
(1982)
Proceedings of the 6th International Conference on Software Engineering (ICSE'82)
, pp. 225-234
-
-
Greenspan, S.J.1
Mylopoulos, J.2
Borgida, A.3
-
5
-
-
84970947585
-
Software engineering for security: A roadmap
-
Finkelstein A (ed) ACM Press, New York
-
Devanbu P, Stubblebine S (2000) Software engineering for security: A roadmap. Finkelstein A (ed) The future of software engineering. ACM Press, New York
-
(2000)
The Future of Software Engineering
-
-
Devanbu, P.1
Stubblebine, S.2
-
6
-
-
32044443362
-
Common concepts underlying safety, security, and survivability engineering
-
Technical Report CMU/SEI-2003-TN-033, Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Firesmith DG (2003) Common concepts underlying safety, security, and survivability engineering. Technical Report CMU/SEI-2003-TN-033, Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
(2003)
-
-
Firesmith, D.G.1
-
7
-
-
32044433021
-
Core security requirements artefacts
-
Technical Report 2004/23, Department of Computing, The Open University, Milton Keynes
-
Moffett JD, Haley CB, Nuseibeh B (2004) Core security requirements artefacts. Technical Report 2004/23, Department of Computing, The Open University, Milton Keynes
-
(2004)
-
-
Moffett, J.D.1
Haley, C.B.2
Nuseibeh, B.3
-
10
-
-
0002686025
-
Trust (and mistrust) in secure applications
-
Viega J, Kohno T, Potter B (2001) Trust (and mistrust) in secure applications. Commun ACM 44(2):31-36
-
(2001)
Commun ACM
, vol.44
, Issue.2
, pp. 31-36
-
-
Viega, J.1
Kohno, T.2
Potter, B.3
-
11
-
-
84976781807
-
Reflections on trusting trust
-
Thompson K (1984) Reflections on trusting trust. Commun ACM 27(8):761-763
-
(1984)
Commun ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
12
-
-
5744229775
-
Deriving security requirements from crosscutting threat descriptions
-
Lancaster, 22-26 March 2004. ACM Press, New York
-
Haley CB, Laney RC, Nuseibeh B (2004) Deriving security requirements from crosscutting threat descriptions. Proceedings of the 3rd international conference on aspect-oriented software development (AOSD'04), Lancaster, 22-26 March 2004. ACM Press, New York, pp 112-121
-
(2004)
Proceedings of the 3rd International Conference on Aspect-Oriented Software Development (AOSD'04)
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.C.2
Nuseibeh, B.3
-
14
-
-
0030834984
-
Four dark corners of requirements engineering
-
Zave P, Jackson M (1997) Four dark corners of requirements engineering. Trans Softw Eng Method 6(1):1-30
-
(1997)
Trans Softw Eng Method
, vol.6
, Issue.1
, pp. 1-30
-
-
Zave, P.1
Jackson, M.2
-
16
-
-
84910035214
-
Analysing security requirements of information systems using Tropos
-
Angers, 23-26 April 2003
-
Gani A, Manson G, Giorgini P, Mouratidis H (2003) Analysing security requirements of information systems using Tropos. Proceedings of the 5th international conference on enterprise information systems (ICEIS'03), Angers, 23-26 April 2003
-
(2003)
Proceedings of the 5th International Conference on Enterprise Information Systems (ICEIS'03)
-
-
Gani, A.1
Manson, G.2
Giorgini, P.3
Mouratidis, H.4
-
19
-
-
35248826597
-
Trust management tools for internet applications
-
Heraklion, Crete, 28-30 May 2003. Springer, Berlin Heidelberg New York
-
Grandison T, Sloman M (2003) Trust management tools for internet applications. Proceedings of the 1st international conference on trust management, vol 2692, Heraklion, Crete, 28-30 May 2003. Springer, Berlin Heidelberg New York
-
(2003)
Proceedings of the 1st International Conference on Trust Management
, vol.2692
-
-
Grandison, T.1
Sloman, M.2
-
24
-
-
84942921136
-
Modelling trust for system design using the i * strategic actors framework
-
Falcone R, Singh MP, Tan YH (eds) Springer, Berlin Heidelberg New York, 15-16 October 2002
-
Yu E, Liu L (2001) Modelling trust for system design using the i* strategic actors framework. Falcone R, Singh MP, Tan YH (eds) Trust in cyber-societies, integrating the human and artificial perspectives Springer, Berlin Heidelberg New York, 15-16 October 2002, pp 175-194
-
(2001)
Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
, pp. 175-194
-
-
Yu, E.1
Liu, L.2
-
26
-
-
84931838020
-
A requirements-driven development methodology
-
Interlaken, Switzerland, 4-8 June 2001
-
Castro J, Kolp M, Mylopoulos J (2001) A requirements-driven development methodology. Proceedings of the 13th conference on advanced information systems engineering (CAiSE'01), Interlaken, Switzerland, 4-8 June 2001, pp 108-123
-
(2001)
Proceedings of the 13th Conference on Advanced Information Systems Engineering (CAiSE'01)
, pp. 108-123
-
-
Castro, J.1
Kolp, M.2
Mylopoulos, J.3
-
27
-
-
0034829384
-
Model checking early requirements specifications in Tropos
-
Toronto
-
Fuxman A, Pistore M, Mylopoulos J, Traverso P (2001) Model checking early requirements specifications in Tropos. Proceedings of the 5th IEEE international symposium on requirements engineering, Toronto, pp 174-181
-
(2001)
Proceedings of the 5th IEEE International Symposium on Requirements Engineering
, pp. 174-181
-
-
Fuxman, A.1
Pistore, M.2
Mylopoulos, J.3
Traverso, P.4
-
28
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
-
Chicago, 13-16 October 2003. Springer, Berlin Heidelberg New York
-
Giorgini P, Massacci F, Mylopoulos J (2003) Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. Proceedings of the 22nd international conference on conceptual modeling, Chicago, 13-16 October 2003. Springer, Berlin Heidelberg New York, pp 263-276
-
(2003)
Proceedings of the 22nd International Conference on Conceptual Modeling
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
29
-
-
35048841167
-
2004 Requirements engineering meets trust management: Model, method, and reasoning
-
Oxford, 28 March-1 April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Giorgini P, Massacci F, Mylopoulos J, Zannone N (2004) Requirements engineering meets trust management: Model, method, and reasoning. Proceedings of the 2nd international conference on trust management, Oxford, 28 March-1 April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Proceedings of the 2nd International Conference on Trust Management
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
30
-
-
35048845022
-
Integrating security and systems engineering: Toward the modelling of secure information systems
-
Klagenfurt/Velden, 6-10 June 2003. Springer, Berlin Heidelberg New York
-
Mouratidis H, Giorgini P, Manson G (2003) Integrating security and systems engineering: Toward the modelling of secure information systems. Proceedings of the 15th conference on advanced information systems engineering (CAiSE'03), Klagenfurt/Velden, 6-10 June 2003. Springer, Berlin Heidelberg New York
-
(2003)
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE'03)
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
31
-
-
0034829309
-
Requirements modeling for organization networks: A (dis)trust-based approach
-
27-31 August 2001. IEEE Computer Society Press, Toronto
-
Gans G, Jarke M, Kethers S, Lakemeyer G, Ellrich L, Funken C, Meister M (2001) Requirements modeling for organization networks: A (dis)trust-based approach. Proceedings of the 5th IEEE international symposium on requirements engineering (RE'01), 27-31 August 2001. IEEE Computer Society Press, Toronto, pp 154-165
-
(2001)
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE'01)
, pp. 154-165
-
-
Gans, G.1
Jarke, M.2
Kethers, S.3
Lakemeyer, G.4
Ellrich, L.5
Funken, C.6
Meister, M.7
-
34
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. Transact Softw Eng (IEEE) 26(10):978-1005
-
(2000)
Transact Softw Eng (IEEE)
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
36
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
11th international requirements engineering conference (RE'03), Monterey, 8 September 2003
-
van Lamsweerde A, Brohez S, De Landtsheer R, Janssens D (2003) From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. Requirements for high assurance systems workshop (RHAS'03), 11th international requirements engineering conference (RE'03), Monterey, 8 September 2003
-
(2003)
Requirements for High Assurance Systems Workshop (RHAS'03)
-
-
van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
-
37
-
-
24344462080
-
A framework for modeling privacy requirements in role engineering
-
Klagenfurt/Velden, 16 June 2003 Klagenfurt/Velden, 16 June 2003
-
He Q, Antón AI (2003) A framework for modeling privacy requirements in role engineering. Proceedings of the 9th international workshop on requirements engineering: Foundation for software quality, the 15th conference on advanced information systems engineering (CAiSE'03), Klagenfurt/Velden, 16 June 2003 Klagenfurt/Velden, 16 June 2003
-
(2003)
Proceedings of the 9th International Workshop on Requirements Engineering: Foundation for Software Quality, The 15th Conference on Advanced Information Systems Engineering (CAiSE'03)
-
-
He, Q.1
Antón, A.I.2
-
38
-
-
84955606787
-
Applying 'practical' formal methods to the specification and analysis of security properties
-
St. Petersburg, 21-23 May 2001. Springer, Berlin Heidelberg New York
-
Heitmeyer CL (2001) Applying 'practical' formal methods to the specification and analysis of security properties. Proceedings of the international workshop on information assurance in computer networks: methods, models, and architectures for network computer security (MMM ACNS 2001), vol 2052, St. Petersburg, 21-23 May 2001. Springer, Berlin Heidelberg New York, pp 84-89
-
(2001)
Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Computer Security (MMM ACNS 2001)
, vol.2052
, pp. 84-89
-
-
Heitmeyer, C.L.1
-
39
-
-
0035564297
-
Using WinWin quality requirements management tools: A case study
-
In H, Boehm BW (2001) Using WinWin quality requirements management tools: A case study. Ann Softw Eng 11(1):141-174
-
(2001)
Ann Softw Eng
, vol.11
, Issue.1
, pp. 141-174
-
-
In, H.1
Boehm, B.W.2
-
45
-
-
32044436702
-
Writing effective security abuse cases
-
Technical Report YCS-2004-375, Department of Computer Science, University of York, York, 11 May 2004
-
Srivatanakul T, Clark JA, Polack F (2004) Writing effective security abuse cases. Technical Report YCS-2004-375, Department of Computer Science, University of York, York, 11 May 2004
-
(2004)
-
-
Srivatanakul, T.1
Clark, J.A.2
Polack, F.3
-
46
-
-
84942929509
-
Introducing abuse frames for analyzing security requirements
-
Monterey, 8-12 September 2003
-
Lin L, Nuseibeh B, Ince D, Jackson M, Moffett J (2003) Introducing abuse frames for analyzing security requirements. Proceedings of the 11th IEEE international requirements engineering conference (RE'03), Monterey, 8-12 September 2003, pp 371-372
-
(2003)
Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03)
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
47
-
-
0141650632
-
Modularisation and composition of aspectual requirements
-
Boston, 17-21 March 2003. ACM Press, New York
-
Rashid A, Moreira AMD, Araújo J (2003) Modularisation and composition of aspectual requirements. Proceedings of the 2nd international conference on aspect-oriented software development (AOSD'03), Boston, 17-21 March 2003. ACM Press, New York, pp 11-20
-
(2003)
Proceedings of the 2nd International Conference on Aspect-oriented Software Development (AOSD'03)
, pp. 11-20
-
-
Rashid, A.1
Moreira, A.M.D.2
Araújo, J.3
-
48
-
-
17044397802
-
Early aspects: A model for aspect-oriented requirements engineering
-
Essen, 9-13 September 2002
-
Rashid A, Sawyer P, Moreira AMD, Araújo J (2002) Early aspects: A model for aspect-oriented requirements engineering. Proceedings of the IEEE joint international conference on requirements engineering (RE'02), Essen, 9-13 September 2002, pp 199-202
-
(2002)
Proceedings of the IEEE Joint International Conference on Requirements Engineering (RE'02)
, pp. 199-202
-
-
Rashid, A.1
Sawyer, P.2
Moreira, A.M.D.3
Araújo, J.4
-
49
-
-
84879473056
-
Integrating the NFR framework in a RE model
-
Presented at Early aspects 2004: aspect-oriented requirements engineering and architecture design (AORE'04), with the 3rd international conference on aspect-oriented software development (AOSD'04), Lancaster University, UK
-
Brito I, Moreira A (2004) Integrating the NFR framework in a RE model. Presented at Early aspects 2004: Aspect-oriented requirements engineering and architecture design (AORE'04), with the 3rd international conference on aspect-oriented software development (AOSD'04), Lancaster University, UK
-
(2004)
-
-
Brito, I.1
Moreira, A.2
-
51
-
-
25444462095
-
The roots of computer supported argument visualization
-
Kirschner PA, Buckingham Shum SJ, Carr CS (eds) Springer London
-
Backingham Shum SJ (2003) The roots of computer supported argument visualization. Kirschner PA, Buckingham Shum SJ, Carr CS (eds) Visualizing argumentation: Software tools for collaborative, educational sense-making. Springer, London, pp 3-24
-
(2003)
Visualizing Argumentation: Software Tools for Collaborative, Educational Sense-Making
, pp. 3-24
-
-
Backingham Shum, S.J.1
-
54
-
-
0025498594
-
Telos: Representing knowledge about information systems
-
Mylopoulos J, Borgida A, Jarke M, Koubarakis M (1990) Telos: representing knowledge about information systems. ACM Trans Inf Syst (TOIS) 8(4):325-362
-
(1990)
ACM Trans Inf Syst (TOIS)
, vol.8
, Issue.4
, pp. 325-362
-
-
Mylopoulos, J.1
Borgida, A.2
Jarke, M.3
Koubarakis, M.4
-
55
-
-
0026882989
-
Supporting systems development by capturing deliberations during requirements engineering
-
Ramesh B, Dhar V (1992) Supporting systems development by capturing deliberations during requirements engineering. IEEE Trans Softw Eng 18(6):498-510
-
(1992)
IEEE Trans Softw Eng
, vol.18
, Issue.6
, pp. 498-510
-
-
Ramesh, B.1
Dhar, V.2
-
56
-
-
0003224879
-
Making argumentation serve design
-
Moran T, Carrol J (Eds) Lawrence Erlbaum and Associates, Mahwah
-
Fischer G, Lemke AC, McCall R, Morch A (1996) Making argumentation serve design. Moran T, Carrol J (Eds) Design rationale concepts, techniques, and use. Lawrence Erlbaum and Associates, Mahwah, pp 267-293
-
(1996)
Design Rationale Concepts, Techniques, and Use
, pp. 267-293
-
-
Fischer, G.1
Lemke, A.C.2
McCall, R.3
Morch, A.4
-
58
-
-
32044465722
-
Arguing security: Validating security requirements using structured argumentation
-
Technical Report 2005/04, Department of Computing, The Open University, Milton Keynes, 21 March 2005
-
Haley CB, Laney RC, Nuseibeh B (2005) Arguing security: Validating security requirements using structured argumentation. Technical Report 2005/04, Department of Computing, The Open University, Milton Keynes, 21 March 2005
-
(2005)
-
-
Haley, C.B.1
Laney, R.C.2
Nuseibeh, B.3
-
59
-
-
17044394776
-
The effect of trust assumptions on the elaboration of security requirements
-
Kyoto, 6-10 September 2004. IEEE Computer Society Press
-
Haley CB, Laney RC, Moffett JD, Nuseibeh B (2004) The effect of trust assumptions on the elaboration of security requirements. Proceedings of the 12th international requirements engineering conference (RE'04), Kyoto, 6-10 September 2004. IEEE Computer Society Press, pp 102-111
-
(2004)
Proceedings of the 12th International Requirements Engineering Conference (RE'04)
, pp. 102-111
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
60
-
-
35048837543
-
Picking battles: The impact of trust assumptions on the elaboration of security requirements
-
St Anne's College, Oxford, 29 March-1April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Haley CB, Laney RC, Moffett JD, Nuseibeh B (2004) Picking battles: The impact of trust assumptions on the elaboration of security requirements. Proceedings of the 2nd international conference on trust management (iTrust'04), vol 2995, St Anne's College, Oxford, 29 March-1April 2004. Lecture notes in computer science. Springer, Berlin Heidelberg New York, pp 347-354
-
(2004)
Proceedings of the 2nd International Conference on Trust Management (iTrust'04)
, vol.2995
, pp. 347-354
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
|