-
1
-
-
78651418385
-
OCTAVE Framework, Version 1.0
-
Alberts, C.J., Behrens, S.G., Pethia, R.D., and Wilson, W.R., OCTAVE Framework, Version 1.0.1999: Networked Systems Survivability Program, p. 84.
-
(1999)
Networked Systems Survivability Program
, pp. 84
-
-
Alberts, C.J.1
Behrens, S.G.2
Pethia, R.D.3
Wilson, W.R.4
-
2
-
-
0002082632
-
The development duality of information systems security
-
Baskeville, R., The development duality of information systems security. Journal of Management Systems, 1992. 4(1): p. 1-12.
-
(1992)
Journal of Management Systems
, vol.4
, Issue.1
, pp. 1-12
-
-
Baskeville, R.1
-
4
-
-
4544242352
-
Balancing agility and discipline: Evaluating and integrating agile and plan-driven methods
-
Boehm, B. and Turner, R., Balancing Agility and Discipline: Evaluating and Integrating Agile and Plan-Driven Methods. 2004: ICSE'04. p. 718-719.
-
(2004)
ICSE'04
, pp. 718-719
-
-
Boehm, B.1
Turner, R.2
-
5
-
-
84935093956
-
Towards a systematic development of secure systems
-
Breu, R., Burger, K., Hafner, M., and Popp, G., Towards a Systematic Development of Secure Systems. 2004: WOSIS 2004.
-
(2004)
WOSIS 2004
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Popp, G.4
-
8
-
-
2942757657
-
Engineering security requirements
-
Firesmith, D.G., Engineering Security Requirements. Journal of Object Technology, 2003. 2(1): p. 53-68.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.G.1
-
10
-
-
2942753973
-
Specifying reusable security requirements
-
Firesmith, D.G., Specifying Reusable Security Requirements. 2004: Journal of Object Technology, p. 61-75.
-
(2004)
Journal of Object Technology
, pp. 61-75
-
-
Firesmith, D.G.1
-
11
-
-
68249148138
-
Security requirements for web services based on SIREN
-
together with the 13th IEEE International Requirements Engineering Conference - RE'05
-
Gutiérrez, C., Moros, B., Toval, A., Fernández-Medina, E., and Piattini, M., Security Requirements for Web Services based on SIREN. Symposium on Requirements Engineering for Information Security (SREIS-2005), together with the 13th IEEE International Requirements Engineering Conference - RE'05, 2005.
-
(2005)
Symposium on Requirements Engineering for Information Security (SREIS-2005)
-
-
Gutiérrez, C.1
Moros, B.2
Toval, A.3
Fernández-Medina, E.4
Piattini, M.5
-
13
-
-
33745880766
-
Modeling security requirements for information systems development
-
Jennex, M.E., Modeling security requirements for information systems development. 2005: SREIS 2005.
-
(2005)
SREIS 2005
-
-
Jennex, M.E.1
-
15
-
-
33745899098
-
Automatic translation form requirements model into use cases modeling on UML
-
C. Youn-Ky, Editor
-
Kim., H.-K., Automatic Translation Form Requirements Model into Use Cases Modeling on UML, C. Youn-Ky, Editor. 2005: ICCSA 2005.
-
(2005)
ICCSA 2005
-
-
Kim, H.-K.1
-
19
-
-
1142293428
-
A natural extension of tropos methodology for modelling security
-
Seattle, WA, USA
-
Mouratidis, H., Giorgini, P., Manson, G., and Philp, I. A Natural Extension of Tropos Methodology for Modelling Security, in Workshop on Agent-oriented methodologies, at OOPSLA 2002. 2003. Seattle, WA, USA.
-
(2003)
Workshop on Agent-oriented Methodologies, at OOPSLA 2002
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
Philp, I.4
-
20
-
-
33747329910
-
Threat modeling as a basis for security requirements
-
Myagmar, S., J. Lee, A., and Yurcik, W., Threat Modeling as a Basis for Security Requirements. 2005: SREIS 2005.
-
(2005)
SREIS 2005
-
-
Myagmar, S.1
Lee, J.A.2
Yurcik, W.3
-
21
-
-
39449131317
-
Agile security requirements engineering
-
Peeters, J., Agile Security Requirements Engineering. 2005: SREIS 2005.
-
(2005)
SREIS 2005
-
-
Peeters, J.1
-
22
-
-
84944683046
-
Security-critical system development with extended use cases
-
Popp, G., Jürjens, J., Wimmel, G., and Breu, R., Security-Critical System Development with Extended Use Cases. 2003: 10th Asia-Pacific Software Engineering Conference, p. 478-487.
-
(2003)
10th Asia-Pacific Software Engineering Conference
, pp. 478-487
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
24
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
Toval, A., Nicolas, J., Moros, B., and García, F., Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. 2001: Requirements Engineering Journal, p. 205-219.
-
(2001)
Requirements Engineering Journal
, pp. 205-219
-
-
Toval, A.1
Nicolas, J.2
Moros, B.3
García, F.4
|