-
3
-
-
4143082542
-
'Risk assessment of a cardiology eHealth service in HYGEIAnet'
-
Stathiakis N, Chronaki C, Skipenes E, Henriksen E, Charalambous E, Sykianakis A, Vrouchos G, Antonakis N, Tsiknakis M and Orphanoudakis S: 'Risk assessment of a cardiology eHealth service in HYGEIAnet', in Proc Computers in Cardiology (CIC'2003), pp 201-204 (2003).
-
(2003)
Proc Computers in Cardiology (CIC'2003)
, pp. 201-204
-
-
Stathiakis, N.1
Chronaki, C.2
Skipenes, E.3
Henriksen, E.4
Charalambous, E.5
Sykianakis, A.6
Vrouchos, G.7
Antonakis, N.8
Tsiknakis, M.9
Orphanoudakis, S.10
-
7
-
-
20444393153
-
'Experiences from using the CORAS methodology to analyse a Web application'
-
den Braber F, Mildal A B, Nes J, Stølen K and Vraalsen F: 'Experiences from using the CORAS methodology to analyse a Web application', Journal of Cases on Information Technology, 7, No 3, pp 110-130 (2005).
-
(2005)
Journal of Cases on Information Technology
, vol.7
, Issue.3
, pp. 110-130
-
-
den Braber, F.1
Mildal, A.B.2
Nes, J.3
Stølen, K.4
Vraalsen, F.5
-
10
-
-
33750384757
-
'A graphical approach to risk identification, motivated by empirical investigations'
-
Hogganvik I and Stølen K: 'A graphical approach to risk identification, motivated by empirical investigations', in Proc MoDELS'06 LNCS 4199, pp 574-588 (2006).
-
(2006)
Proc MoDELS'06 LNCS 4199
, pp. 574-588
-
-
Hogganvik, I.1
Stølen, K.2
-
11
-
-
0001094070
-
'The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems'
-
Barber B and Davey J: 'The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems', in Proc MEDINFO'92, pp 1589-1593 (1992).
-
(1992)
Proc MEDINFO'92
, pp. 1589-1593
-
-
Barber, B.1
Davey, J.2
-
14
-
-
0037240812
-
'Misuse cases: Use cases with hostile intent'
-
Alexander I: 'Misuse cases: Use cases with hostile intent', IEEE Software, 20, No 1, pp 58-66 (2003).
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
15
-
-
0034497420
-
'Eliciting Security Requirements by Misuse Cases'
-
Sindre G and Opdahl A L: 'Eliciting Security Requirements by Misuse Cases', in Proc TOOLS-PACIFIC, pp 120-131 (2000).
-
(2000)
Proc TOOLS-PACIFIC
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
21
-
-
79955143136
-
'SecureUML: A UML-Based Modeling Language for Model-Driven Security'
-
Lodderstedt T, Basin D and Doser J: 'SecureUML: A UML-Based Modeling Language for Model-Driven Security', in Proc UML'02, LNCS 2460, pp 426-441 (2002).
-
(2002)
Proc UML'02, LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
22
-
-
0002670359
-
'Attack trees: Modeling security threats'
-
Schneier B: 'Attack trees: Modeling security threats', Dr Dobb's Journal, 24, No 12, pp 21-29 (1999).
-
(1999)
Dr Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
25
-
-
0003850384
-
'The Cause/Consequence Diagram Method as a Basis for Quantitative Accident Analysis'
-
Nielsen D S: 'The Cause/Consequence Diagram Method as a Basis for Quantitative Accident Analysis', Danish Atomic Energy Commission, RISO-M-1374 (1971).
-
(1971)
Danish Atomic Energy Commission, RISO-M-1374
-
-
Nielsen, D.S.1
|