-
1
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
In January/February 2003, IEEE Computer Society Press, Los Alamitos, California
-
Alexander, I.: Misuse cases: Use cases with hostile intent. In IEEE Software, Vol. 20, No. 1, January/February 2003, IEEE Computer Society Press, Los Alamitos, California (2003) 58-66.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
2
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
In Monterey, California, 8-12 September 2003, IEEE Computer Society Press, Los Alamitos, California
-
Liu, L., Yu, E. and Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE'03), Monterey, California, 8-12 September 2003, IEEE Computer Society Press, Los Alamitos, California (2003) 151-161.
-
(2003)
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE'03)
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
3
-
-
0002670359
-
Attack Trees: Modeling Security Threats
-
In December 1999, CMP Media LLC, Manhasset, New York, USA
-
Schneier, B.: Attack Trees: Modeling Security Threats. In Dr. Dobb's Journal, Vol. 24, No. 12, December 1999, CMP Media LLC, Manhasset, New York, USA (2003) 21-29.
-
(2003)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
4
-
-
0034816038
-
A method for designing secure solutions
-
In IBM, Riverton, New Jersey, USA
-
Whitmore, J. J.: A method for designing secure solutions. In IBM Systems Journal, Vol. 40, No. 3, IBM, Riverton, New Jersey, USA (2001) 747-768. http://www.research.ibm.com/journal/sj
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 747-768
-
-
Whitmore, J.J.1
-
5
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
In Elsevier, UK
-
Zuccato, A.: Holistic security requirement engineering for electronic commerce. In Computers & Security, Vol. 23, No. 1, Elsevier, UK (2004) 63-76.
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63-76
-
-
Zuccato, A.1
-
6
-
-
0010729284
-
-
(2nd Ed.), Microsoft Press, Redmond, Washington, USA
-
Howard, M., and LeBlanc, D. Writing secure code, (2nd Ed.), Microsoft Press, Redmond, Washington, USA (2003).
-
(2003)
Writing Secure Code
-
-
Howard, M.1
LeBlanc, D.2
-
7
-
-
0034497420
-
Eliciting Security Requirements by Misuse Cases
-
In Sydney, Australia, 20-23 November 2000 IEEE Press, Los Alamitos, Cahfomia, USA
-
Sindre, G. and Opdahl, A.L.: Eliciting Security Requirements by Misuse Cases. In Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-Pacific 2000), Sydney, Australia, 20-23 November 2000 IEEE Press, Los Alamitos, Cahfomia, USA (2000) 120-131.
-
(2000)
Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-Pacific 2000)
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
8
-
-
12344293871
-
A methodology for secure software design
-
In Las Vegas, Nevada, USA, 21-24 June 2004, H. R. Arabnia and H. Reza (eds.), CSREA Press, USA
-
Fernandez, E. B.: A methodology for secure software design. In Software Engineering Research and Practice: Proceedings of the International Conference on Software Engineering Research and Practice, SERP '04, Las Vegas, Nevada, USA, Vol. 1, 21-24 June 2004, H. R. Arabnia and H. Reza (eds.), CSREA Press, USA (2004) 130-136.
-
(2004)
Software Engineering Research and Practice: Proceedings of the International Conference on Software Engineering Research and Practice, SERP '04
, vol.1
, pp. 130-136
-
-
Fernandez, E.B.1
-
9
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
In H. Mouratidis and P. Giorgini (Eds.), Idea Group, Hershey, Pennsylvania, USA
-
Fernandez, E. B., Larrondo-Petrie, M. M., Sorgente, T. and VanHilst M.: A methodology to develop secure systems using patterns. In Integrating security and software engineering: Advances and future vision, H. Mouratidis and P. Giorgini (Eds.), Idea Group, Hershey, Pennsylvania, USA (2006).
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
10
-
-
0004012875
-
-
(3nd edition.), Prentice-Hall, Englewood Cliffs, New Jersey, USA
-
Larman, C.: Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development (3nd edition.), Prentice-Hall, Englewood Cliffs, New Jersey, USA (2005).
-
(2005)
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development
-
-
Larman, C.1
-
11
-
-
33845238529
-
-
Addison-Wesley, Reading, Massachussetts, USA
-
Fernandez, E. B., Gudes, E. and Olivier, M.: The Design of Secure Systems, Addison-Wesley, Reading, Massachussetts, USA (2007).
-
(2007)
The Design of Secure Systems
-
-
Fernandez, E.B.1
Gudes, E.2
Olivier, M.3
-
12
-
-
0031363895
-
Determining Role Rights from Use Cases
-
In Fairfax, Virginia, USA, 6-7 November 1997, ACM Press, New York, New York, USA
-
Fernandez, E. B., and Hawkins, J.C.: Determining Role Rights from Use Cases. In Proceedings of the 2nd ACM Workshop on Role-Based Access Control, RBAC'97, Fairfax, Virginia, USA, 6-7 November 1997, ACM Press, New York, New York, USA (1997) 121-125.
-
(1997)
Proceedings of the 2nd ACM Workshop on Role-Based Access Control, RBAC'97
, pp. 121-125
-
-
Fernandez, E.B.1
Hawkins, J.C.2
-
13
-
-
0003547470
-
-
(2nd Ed.), Addison-Wesley, Upper Saddle River, New Jersey, USA
-
Booch, G., Rumbaugh, J. and Jacobson, I.: The Unified Modeling Language User Guide (2nd Ed.), Addison-Wesley, Upper Saddle River, New Jersey, USA (2005).
-
(2005)
The Unified Modeling Language User Guide
-
-
Booch, G.1
Rumbaugh, J.2
Jacobson, I.3
-
14
-
-
77952351104
-
The Account Analysis Pattern
-
In Irsee Germany, 3-7 July 2002, Universitätsverlag Konstanz, Konstanz, Germany
-
Fernandez, E. B. and Liu, Y.: The Account Analysis Pattern. In Proceedings of EuroPLoP 2002 (Pattern Languages of Programs), Irsee Germany, 3-7 July 2002, Universitätsverlag Konstanz, Konstanz, Germany, (2002). http://www.hillside.net/patterns/EuroPLoP2002/
-
(2002)
Proceedings of EuroPLoP 2002 (Pattern Languages of Programs)
-
-
Fernandez, E.B.1
Liu, Y.2
-
15
-
-
0028495490
-
Requirements specification for process control systems
-
In September 1994, IEEE Computer Society Press, Los Alamitos, California, USA
-
Leveson, N. G., Heimdahl, M. P. E., Hildreth, H. and Reese, J. D.: Requirements specification for process control systems. In IEEE Transactions on Software Engineering, Vol. 20, No 9, September 1994, IEEE Computer Society Press, Los Alamitos, California, USA (1994) 684-707.
-
(1994)
IEEE Transactions on Software Engineering
, vol.20
, Issue.9
, pp. 684-707
-
-
Leveson, N.G.1
Heimdahl, M.P.E.2
Hildreth, H.3
Reese, J.D.4
-
16
-
-
33845239031
-
A goal-oriented approach for mitigating security and continuity risks
-
In 13-15 March 2006, Arlington, Virginia, USA
-
Cleland-Huang, J., Denne, M., Mahjub, G., and Patel, N.: A goal-oriented approach for mitigating security and continuity risks. In Proceedings, of the IEEE Inernational Symposium on Secure Software Engineering (ISSSE'06), 13-15 March 2006, Arlington, Virginia, USA (2006) 167-177.
-
(2006)
Proceedings, of the IEEE Inernational Symposium on Secure Software Engineering (ISSSE'06)
, pp. 167-177
-
-
Cleland-Huang, J.1
Denne, M.2
Mahjub, G.3
Patel, N.4
-
17
-
-
5744229775
-
Deriving security requirements from crosscutting threat descriptions
-
In Lancaster, UK, 22-26 March 2004, ACM Press, New York, New York, USA
-
Haley, C.B., Laney, R.C., and Nuseiben, B.: Deriving security requirements from crosscutting threat descriptions. In Proceedings of the 3rd. International Conference on Aspect-Oriented Software Development (AOSD'04), Lancaster, UK, 22-26 March 2004, ACM Press, New York, New York, USA (2004) 112-121.
-
(2004)
Proceedings of the 3rd. International Conference on Aspect-Oriented Software Development (AOSD'04)
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.C.2
Nuseiben, B.3
-
19
-
-
33845247360
-
Deriving access control policies from requirements specifications and database design
-
North Carolina State University CS Technical Report. TR-2004-24
-
He, Q. and Anton, A. I.: Deriving access control policies from requirements specifications and database design. North Carolina State University CS Technical Report. TR-2004-24, (2004).
-
(2004)
-
-
He, Q.1
Anton, A.I.2
-
20
-
-
8444240069
-
Using security attach scenarios to analyse security during information systems Design
-
In Porto, Portugal, April 2004
-
Mouratidis, H.,Giorgini, P. and Manson, G.A.: Using security attach scenarios to analyse security during information systems Design. In Proceedings of the 2nd International Workshop on Security in Information Systems at ICEIS 2004, Porto, Portugal, April 2004 (2004) 10-17.
-
(2004)
Proceedings of the 2nd International Workshop on Security in Information Systems at ICEIS 2004
, pp. 10-17
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
21
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
In Edinburgh, UK, 23-28 May 2004, IEEE Computer Society Press, Los Alamitos, California, USA
-
van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In Proceedings of the 26th International Conference on Software Engineering (ICSE'04), Edinburgh, UK, 23-28 May 2004, IEEE Computer Society Press, Los Alamitos, California, USA (2004) 148-157.
-
(2004)
Proceedings of the 26th International Conference on Software Engineering (ICSE'04)
, pp. 148-157
-
-
van Lamsweerde, A.1
-
22
-
-
84979008962
-
-
Held in conjunction with The 11th International Workshop on Program Comprehension, IWPC 2003 10 May 2003, Portland, Oregon, USA, IEEE Computer Society Press, Los Alamitos, California, USA
-
Huang, S. and Tilley, A.: Workshop on Graphical Documentation for Programmers: Assessing the Efficacy of UML Diagrams for Program Understanding. Held in conjunction with The 11th International Workshop on Program Comprehension, IWPC 2003, 10 May 2003, Portland, Oregon, USA, IEEE Computer Society Press, Los Alamitos, California, USA (2003) 281-282.
-
(2003)
Workshop on Graphical Documentation for Programmers: Assessing the Efficacy of UML Diagrams for Program Understanding
, pp. 281-282
-
-
Huang, S.1
Tilley, A.2
-
23
-
-
17044440521
-
A qualitative assessment of the efficacy of UML diagrams as a form of graphical documentation in aiding program understanding
-
In (SIGDOC 2003: 12-15 October 2003; San Francisco, California, USA, ACM Press: New York, New York, USA
-
Tilley, S., and Huang, S.: A qualitative assessment of the efficacy of UML diagrams as a form of graphical documentation in aiding program understanding. In Proceedings of the 21st ACM Annual International Conference on Design of Communication (SIGDOC 2003: 12-15 October 2003; San Francisco, California, USA, ACM Press: New York, New York, USA (2003) 184-191.
-
(2003)
Proceedings of the 21st ACM Annual International Conference on Design of Communication
, pp. 184-191
-
-
Tilley, S.1
Huang, S.2
|