-
1
-
-
33845216895
-
'A Model Based Approach to Trust, Security and Assurance'
-
(October)
-
Baldwin A, Beres Y, Shiu S and Kearney P: 'A Model Based Approach to Trust, Security and Assurance', BT Technol J, 24, No 4, pp 53-68 (October 2006).
-
(2006)
BT Technol J
, vol.24
, Issue.4
, pp. 53-68
-
-
Baldwin, A.1
Beres, Y.2
Shiu, S.3
Kearney, P.4
-
2
-
-
33947411409
-
'Using assurance models to aid the risk and governance life cycle'
-
(January)
-
Baldwin A, Beres Y and Shiu S: 'Using assurance models to aid the risk and governance life cycle', BT Technol J, 25, No 1, pp 128-140 (January 2007).
-
(2007)
BT Technol J
, vol.25
, Issue.1
, pp. 128-140
-
-
Baldwin, A.1
Beres, Y.2
Shiu, S.3
-
5
-
-
33947369886
-
'The BT Risk Cockpit - A Visual Approach to ORM'
-
(January)
-
Evans G and Benton S: 'The BT Risk Cockpit - A Visual Approach to ORM', BT Technol J, 25, No 1, pp 88-100 (January 2007).
-
(2007)
BT Technol J
, vol.25
, Issue.1
, pp. 88-100
-
-
Evans, G.1
Benton, S.2
-
6
-
-
13644252644
-
'Eliciting security requirements with misuse cases'
-
Sindre G and Opdahl A L: 'Eliciting security requirements with misuse cases', Requir Eng, 10, pp 34-44 (2005).
-
(2005)
Requir Eng
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
8
-
-
2942757657
-
'Engineering Security Requirements'
-
Firesmith D: 'Engineering Security Requirements', Journal of Object Technology, 2, pp 53-68 (2003).
-
(2003)
Journal of Object Technology
, vol.2
, pp. 53-68
-
-
Firesmith, D.1
-
9
-
-
0002670359
-
'Attack Trees: Modeling Security Threats'
-
Schneier B: 'Attack Trees: Modeling Security Threats', Dr Dobb's Journal (1999).
-
(1999)
Dr Dobb's Journal
-
-
Schneier, B.1
-
10
-
-
33745849657
-
'Foundations of Attack Trees'
-
in Springer Lecture Notes in Computer Science
-
Mauw S and Oostdijk M: 'Foundations of Attack Trees', in 'Information Security and Cryptology - ICISC 2005' Springer Lecture Notes in Computer Science, Vol 3935, pp 186-198 (2005).
-
(2005)
'Information Security and Cryptology - ICISC 2005'
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
11
-
-
84887267539
-
-
Microsoft Security Developer Center:
-
Microsoft Security Developer Center: 'Threat Modeling', - http:// msdn.microsoft.com/security/securecode/threatmodeling/default.aspx
-
'Threat Modeling'
-
-
-
13
-
-
33947368645
-
'Model-based security analysis in seven steps - A guided tour to the CORAS method'
-
January
-
Braber et al: 'Model-based security analysis in seven steps - a guided tour to the CORAS method', BT Technol J, 25, No 1, pp 101-117 January (2007).
-
(2007)
BT Technol J
, vol.25
, Issue.1
, pp. 101-117
-
-
Braber1
-
15
-
-
33947354273
-
'QinetiQ: The MOD Application of Domain Based Security (DBSy)'
-
'QinetiQ: The MOD Application of Domain Based Security (DBSy)', Version 1.0, CD-ROM (2004).
-
(2004)
Version 1.0, CD-ROM
-
-
-
17
-
-
17644401409
-
'Bringing security home: A process for developing secure and usable systems'
-
Flechais I, Sasse MAA and Hailes S: 'Bringing security home: a process for developing secure and usable systems', pp 49-57 (2003).
-
(2003)
, pp. 49-57
-
-
Flechais, I.1
Sasse, M.A.2
Hailes, S.3
-
19
-
-
79955143136
-
'SecureUML: A UML-Based Modeling Language for Model-Driven Security'
-
Lodderstedt T, Basin D and Doser J: 'SecureUML: A UML-Based Modeling Language for Model-Driven Security', Lecture Notes in Computer Science, Vol 2460, pp 426-441 (2002).
-
(2002)
Lecture Notes in Computer Science
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
20
-
-
84944220091
-
'Towards Development of Secure Systems Using UMLsec'
-
Jürjens J: 'Towards Development of Secure Systems Using UMLsec', Lecture Notes in Computer Science, Vol 2029, pp 187-200 (2001).
-
(2001)
Lecture Notes in Computer Science
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
|