-
1
-
-
0003619725
-
-
Networked Systems Survivability Program
-
Alberts, C.J., et al., OCTAVE Framework, Version 1.0. 1999: Networked Systems Survivability Program, p. 84.
-
(1999)
OCTAVE Framework, Version 1.0.
, pp. 84
-
-
Alberts, C.J.1
-
2
-
-
0002082632
-
The development duality of information systems security
-
Baskeville, R., The development duality of information systems security. Journal of Management Systems, 1992. 4(1): p. 1-12.
-
(1992)
Journal of Management Systems
, vol.4
, Issue.1
, pp. 1-12
-
-
Baskeville, R.1
-
4
-
-
4544242352
-
Balancing agility and discipline: Evaluating and integrating agile and plan-driven methods
-
Boehm, B. and R. Turner, Balancing Agility and Discipline: Evaluating and Integrating Agile and Plan-Driven Methods. 2004: ICSE'04. p. 718-719.
-
(2004)
ICSE'04.
, pp. 718-719
-
-
Boehm, B.1
Turner, R.2
-
5
-
-
84935093956
-
Towards a systematic development of secure systems
-
Breu, R., et al., Towards a Systematic Development of Secure Systems. 2004: WOSIS 2004.
-
(2004)
WOSIS 2004
-
-
Breu, R.1
-
8
-
-
2942757657
-
Engineering security requirements
-
Firesmith, D.G., Engineering Security Requirements. Journal of Object Technology, 2003. 2(1): p. 53-68.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.G.1
-
10
-
-
2942753973
-
Specifying reusable security requirements
-
Firesmith, D.G., Specifying Reusable Security Requirements. 2004: Journal of Object Technology, p. 61-75.
-
(2004)
Journal of Object Technology
, pp. 61-75
-
-
Firesmith, D.G.1
-
11
-
-
68249148138
-
Security requirements for web services based on SIREN
-
Gutiérrez, C., et al., Security Requirements for Web Services based on SIREN. 2005: SREIS-2005.
-
(2005)
SREIS-2005
-
-
Gutiérrez, C.1
-
14
-
-
33745880766
-
Modeling security requirements for information systems development
-
Jennex, M.E., Modeling security requirements for information systems development. 2005: SREIS 2005.
-
(2005)
SREIS 2005
-
-
Jennex, M.E.1
-
16
-
-
33745899098
-
Automatic translation form requirements model into use cases modeling on UML
-
C. Youn-Ky, Editor
-
Kim., H.-K., Automatic Translation Form Requirements Model into Use Cases Modeling on UML, C. Youn-Ky, Editor. 2005: ICCSA 2005.
-
(2005)
ICCSA 2005
-
-
Kim, H.-K.1
-
20
-
-
1142293428
-
A natural extension of tropos methodology for modelling security
-
Seattle, WA, USA
-
Mouratidis, H., et al. A Natural Extension of Tropos Methodology for Modelling Security, in Workshop on Agent-oriented methodologies, at OOPSLA 2002. 2003. Seattle, WA, USA.
-
(2003)
Workshop on Agent-oriented Methodologies, at OOPSLA 2002
-
-
Mouratidis, H.1
-
21
-
-
33747329910
-
Threat modeling as a basis for security requirements
-
Myagmar, S., A. J. Lee, and W. Yurcik, Threat Modeling as a Basis for Security Requirements. 2005: SREIS 2005.
-
(2005)
SREIS 2005
-
-
Myagmar, S.1
Lee, A.J.2
Yurcik, W.3
-
22
-
-
39449131317
-
Agile security requirements engineering
-
Peeters, J., Agile Security Requirements Engineering. 2005: SREIS 2005.
-
(2005)
SREIS 2005
-
-
Peeters, J.1
-
24
-
-
84944683046
-
Security-critical system development with extended use cases
-
Popp, G., et al., Security-Critical System Development with Extended Use Cases. 2003: 10th Asia-Pacific Software Engineering Conference, p. 478-487.
-
(2003)
10th Asia-Pacific Software Engineering Conference
, pp. 478-487
-
-
Popp, G.1
-
26
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
Toval, A., et al., Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. 2001: Requirements Engineering Journal, p. 205-219.
-
(2001)
Requirements Engineering Journal
, pp. 205-219
-
-
Toval, A.1
|