-
2
-
-
37149050856
-
Scenario-oriented modeling in AsmL and its instrumentation for testing
-
May, Algorithms, and Tools, Portland, OR
-
nd International Workshop on Scenarios and State Machines: Models. Algorithms, and Tools, Portland, OR (pp. 8-14).
-
(2003)
nd International Workshop On Scenarios and State Machines: Models
, pp. 8-14
-
-
Barnett, M.1
Grieskamp, W.2
Gurevich, Y.3
Schulte, W.4
Tillman, T.5
Veanes, M.6
-
5
-
-
0024012763
-
A spiral model of software development and enhancement
-
Boehm, B. W. (1988). A spiral model of software development and enhancement. IEEE Computer, 21(5), 61-72.
-
(1988)
IEEE Computer
, vol.21
, Issue.5
, pp. 61-72
-
-
Boehm, B.W.1
-
7
-
-
84970947585
-
Software engineering for security: A roadmap
-
June, In A. Finkelstein (Ed.), Limerick, Ireland: ACM
-
Devanbu, P. T., & Stubblebine, S. (2000, June). Software engineering for security: A roadmap. In A. Finkelstein (Ed.), The Future of Software Engineering. Proceedings of the International Conference on Software Engineering (pp. 227-239). Limerick, Ireland: ACM.
-
(2000)
The Future of Software Engineering. Proceedings of the International Conference On Software Engineering
, pp. 227-239
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
9
-
-
84964572741
-
Software engineering: A roadmap
-
June, In A. Finkelstein (Ed.), Limerick, Ireland: ACM
-
Finkelstein, A., & Kramer, J. (2000, June). Software engineering: A roadmap. In A. Finkelstein (Ed.), The Future of Software Engineering, Proceedings of the International Conference on Software Engineering (pp. 5-22). Limerick, Ireland: ACM.
-
(2000)
The Future of Software Engineering, Proceedings of the International Conference On Software Engineering
, pp. 5-22
-
-
Finkelstein, A.1
Kramer, J.2
-
10
-
-
17644401409
-
Bringing security home: A process for developing secure and usable systems
-
August, ACM
-
Flechals, I., Sasse, M. A., & Hailes, S. M. V. (2003, August). Bringing security home: A process for developing secure and usable systems. In Proceedings of the New Security Paradigms Workshop, Ascona, Switzerland (pp. 49-57). ACM.
-
(2003)
Proceedings of the New Security Paradigms Workshop, Ascona, Switzerland
, pp. 49-57
-
-
Flechals, I.1
Sasse, M.A.2
Hailes, S.M.V.3
-
11
-
-
84944391018
-
Software security checklist for the software life cycle
-
June, IEEE
-
Gilliam, D. P., Wolfe, T. W., & Sherif, J. S. (2003, June). Software security checklist for the software life cycle. In Proceedings of the Twelfth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE '03) (pp. 243-248). IEEE.
-
(2003)
Proceedings of the Twelfth IEEE International Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises (WETICE '03)
, pp. 243-248
-
-
Gilliam, D.P.1
Wolfe, T.W.2
Sherif, J.S.3
-
12
-
-
0012239552
-
-
Institute of Electrical and Electronics Engineers, Inc. (IEEE), New York: Institute of Electrical and Electronics Engineers, Inc
-
Institute of Electrical and Electronics Engineers, Inc. (IEEE). (1999). Software engineering: Customer and terminology standards, Vol. 1. New York: Institute of Electrical and Electronics Engineers, Inc.
-
(1999)
Software Engineering: Customer and Terminology Standards
, vol.1
-
-
-
14
-
-
0003902726
-
-
Reading, MA: Addison Wesley
-
Jacobson, I., Booch, G., & Rumbaugh, J. (1999). The unified software development process. Reading, MA: Addison Wesley.
-
(1999)
The Unified Software Development Process
-
-
Jacobson, I.1
Booch, G.2
Rumbaugh, J.3
-
16
-
-
0042689501
-
Toward a discipline of scenario-based architectural engineering
-
Kazman, R., Carriere, S. J., & Woods, S. G. (2000). Toward a discipline of scenario-based architectural engineering. Annals of Software Engineering, 9, 5-33.
-
(2000)
Annals of Software Engineering
, vol.9
, pp. 5-33
-
-
Kazman, R.1
Carriere, S.J.2
Woods, S.G.3
-
17
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Landwehr, C. E., Bull, A. R., McDermott, J. P., & Choi, W. S. (1994). A taxonomy of computer program security flaws. ACM Computing Surveys, 26(3), 211-254.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
19
-
-
0032097883
-
A map of security risks associated with using COTS
-
Retrieved November 2005, from
-
Lindqvist, U., & Jonsson, E. (1998). A map of security risks associated with using COTS. IEEE Computer, 60-66. Retrieved November 2005, from http://downloads.securityfocus.com/library/cots98.pdf
-
(1998)
IEEE Computer
, pp. 60-66
-
-
Lindqvist, U.1
Jonsson, E.2
-
20
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
September, Germany: Springer Verlag
-
Lodderstedt, T., Basin, D., & Doser, J. (2002, September). SecureUML: A UML-based modeling language for model-driven security. In Proceedings of the Fifth International Conference on the Unified Modeling Language: The Language and Its Applications. Germany: Springer Verlag.
-
(2002)
Proceedings of the Fifth International Conference On the Unified Modeling Language: The Language and Its Applications
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
21
-
-
0036534530
-
Managing software security risks
-
McGraw, G. (2002). Managing software security risks. IEEE Computer, 99-101.
-
(2002)
IEEE Computer
, pp. 99-101
-
-
McGraw, G.1
-
22
-
-
84898149426
-
Integration of security engineering into the rational unified process -An early iteration
-
September, Linz, Austria, Austrian Computer Society
-
Oikinomopoulos, S., & Giritzails, S. (2004, September). Integration of security engineering into the rational unified process -An early iteration. In Proceedings of the Workshop on Specification and Automated Processing of Security Requirements - SAPS'04, Linz, Austria (pp. 167-176). Austrian Computer Society.
-
(2004)
Proceedings of the Workshop On Specification and Automated Processing of Security Requirements - SAPS'04
, pp. 167-176
-
-
Oikinomopoulos, S.1
Giritzails, S.2
-
23
-
-
84948980475
-
Component metadata for software engineering tasks
-
Springer-Verlag
-
Orso, A., Harrold, M. J., & Rosenblum, D.(2001). Component metadata for software engineering tasks. In Proceedings of the EDO 2000, Lecture Notes in Computer Science, 1999 (pp. 129-144). Springer-Verlag.
-
(2001)
Proceedings of the EDO 2000, Lecture Notes In Computer Science, 1999
, pp. 129-144
-
-
Orso, A.1
Harrold, M.J.2
Rosenblum, D.3
-
27
-
-
0002174539
-
Managing the development of large software systems: Concepts and techniques
-
In WESCON Technical Papers, 1970, (Reprinted), Monterey, CA: IEEE Computer Society Press
-
Royce, W. W. (1987). Managing the development of large software systems: Concepts and techniques. In WESCON Technical Papers, 1970, (Reprinted), Proceedings of the Ninth International Conference on Software Engineering (pp. 328-338). Monterey, CA: IEEE Computer Society Press.
-
(1987)
Proceedings of the Ninth International Conference On Software Engineering
, pp. 328-338
-
-
Royce, W.W.1
-
29
-
-
0036535619
-
Software system engineering: A tutorial
-
Thayer, R. H. (2002). Software system engineering: A tutorial. Computer, 35(4), 68-73.
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 68-73
-
-
Thayer, R.H.1
-
31
-
-
0010518517
-
Attack languages
-
October, Boston, IEEE
-
Vigna, G., Eckmann, S. T., & Kemmerer, R. A. (2000, October). Attack languages. In Proceedings of the IEEE Information Survivability Workshop, Boston (pp. 63-166). IEEE.
-
(2000)
Proceedings of the IEEE Information Survivability Workshop
, pp. 63-166
-
-
Vigna, G.1
Eckmann, S.T.2
Kemmerer, R.A.3
-
32
-
-
20344386013
-
Is security engineering really just good software engineering?
-
October, Newport Beach, CA
-
Wolf, A. L. (2004, October). Is security engineering really just good software engineering? Keynote Talk, ACM SIGSOFT '04/FSE-12, Newport Beach, CA.
-
(2004)
Keynote Talk, ACM SIGSOFT '04/FSE-12
-
-
Wolf, A.L.1
-
33
-
-
34248526735
-
Applying AsmL specification for automatic intrusion detection
-
September, Linz, Austria, Austrian Computer Society
-
Zhang, Q., & Zulkernine, M. (2004, September). Applying AsmL specification for automatic intrusion detection. In Proceedings of the Workshop on Specification and Automated Processing of Security Requirements - SAPS'04, Linz, Austria (pp. 221-223). Austrian Computer Society.
-
(2004)
Proceedings of the Workshop On Specification and Automated Processing of Security Requirements - SAPS'04
, pp. 221-223
-
-
Zhang, Q.1
Zulkernine, M.2
|