-
2
-
-
0242625201
-
Model driven security for process oriented systems
-
Como, Italy
-
Basin, D., Doser, J., Lodderstedt, T., Model Driven Security for Process Oriented Systems. In Proceedings of the 8th ACM symposium on Access Control Models and Technologies, Como, Italy, 2003
-
(2003)
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
3
-
-
3142750497
-
TROPOS: An agent oriented software development methodology
-
Kluwer Academic Publishers
-
Bresciani, P. Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A., TROPOS: An Agent Oriented Software Development Methodology. In Journal of Autonomous Agents and Multi-Agent Systems, Kluwer Academic Publishers Volume 8, Issue 3, Pages 203-236, 2004
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
5
-
-
84948972584
-
Security requirements engineering: When anti-requirements hit the fan
-
IEEE Press
-
Crook, R., Ince, D., Lin, L., Nuseibeh, B., Security Requirements Engineering: When Anti-requirements Hit the Fan, In Proceedings of the 10 th International Requirements Engineering Conference, pp. 203-205, IEEE Press, 2002
-
(2002)
Proceedings of the 10th International Requirements Engineering Conference
, pp. 203-205
-
-
Crook, R.1
Ince, D.2
Lin, L.3
Nuseibeh, B.4
-
6
-
-
3042581036
-
Nonfunctional requirements: From elicitation to conceptual models
-
Cysneiros, L.M. Sampaio do Prado Leite, J.P., Nonfunctional Requirements: From Elicitation to Conceptual Models. IEEE Trans. Software Eng. 30(5): 328-350 (2004)
-
(2004)
IEEE Trans. Software Eng.
, vol.30
, Issue.5
, pp. 328-350
-
-
Cysneiros, L.M.1
Sampaio Do Prado Leite, J.P.2
-
7
-
-
84970947585
-
Software engineering for security: A roadmap
-
("the conference of the future of Software engineering")
-
Devanbu, P., Stubblebine, S., Software Engineering for Security: a Roadmap. In Proceedings of ICSE 2000 ("the conference of the future of Software engineering"), 2000.
-
(2000)
Proceedings of ICSE 2000
-
-
Devanbu, P.1
Stubblebine, S.2
-
8
-
-
0142156745
-
Requirements engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard
-
Proceedings of the International Conference on Conceptual Modelling (ER), Springer-Verlag
-
Giorgini, P., Massacci, F., Mylopoulos, J., Requirements Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard, in Proceedings of the International Conference on Conceptual Modelling (ER), LNCS 2813, pp. 263-276, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2813
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
10
-
-
23944491305
-
Tools for critical systems development with UML (Tool Demo)
-
UML 2004 Satellite Events, Nuno Jardim Nunes, Bran Selic, Alberto Silva, Ambrosio Toval (eds.), Springer-Verlag 2004E. Protected content can be accessed as user: Reader, with password: Ihavethebook
-
Jürjens, J., Shabalin, P., Tools for Critical Systems Development with UML (Tool Demo), UML 2004 Satellite Events, Nuno Jardim Nunes, Bran Selic, Alberto Silva, Ambrosio Toval (eds.), LNCS, Springer-Verlag 2004E. [Accessible at http://www.UMLsec.org. Protected content can be accessed as user: Reader, with password: Ihavethebook]. Available as open-source.
-
LNCS
-
-
Jürjens, J.1
Shabalin, P.2
-
14
-
-
35048845022
-
Integrating Security and Systems engineering: Towards the modelling of secure information systems
-
Velden -Austria
-
Mouratidis, H., Giorgini, P., Manson, G., Integrating Security and Systems Engineering: towards the modelling of secure information systems. In Proceedings of the 15th Conference on Advanced Information Systems (CaiSE 2003), Velden -Austria, 2003
-
(2003)
Proceedings of the 15th Conference on Advanced Information Systems (CaiSE 2003)
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
15
-
-
0141684322
-
-
March Version 1.5. OMG Document formal/03-03-01
-
Object Management Group, OMG Unified Modeling Language Specification v1.5, March 2003. Version 1.5. OMG Document formal/03-03-01.
-
(2003)
OMG Unified Modeling Language Specification V1.5
-
-
-
16
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Saltzer, J., Schroeder, M., The protection of information in computer systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
17
-
-
0003714340
-
-
Schneider, F., editor. National Academy Press, Washington, DC
-
Schneider, F., editor. Trust in Cyberspace. National Academy Press, Washington, DC, 1999. Available as http://www.nap.edu/readingroom/books/trust/.
-
(1999)
Trust in Cyberspace
-
-
-
20
-
-
33746064515
-
Security Engineering with patterns
-
Springer-Verlag
-
Schumacher, M., Security Engineering with patterns. In LNCS 2754, Springer-Verlag, 2003
-
(2003)
LNCS
, vol.2754
-
-
Schumacher, M.1
-
23
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde, A., Letier, E., Handling Obstacles in Goal-Oriented Requirements Engineering, Transactions of Software Engineering, 26 (10): 978-1005, 2000
-
(2000)
Transactions of Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
24
-
-
0003925663
-
-
Addison-Wesley, Reading, MA
-
Viega, J., McGraw, G., Building a Secure Software. Addison-Wesley, Reading, MA, 2002.
-
(2002)
Building A Secure Software
-
-
Viega, J.1
McGraw, G.2
|