-
1
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander I. Misuse cases: Use cases with hostile intent. IEEE Software 20 1 (2003) 58-66
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
2
-
-
38049147663
-
-
C. Bidan, V. Issarny, Security benefits from software architecture, in: Proceedings of the 2nd International Conference on Coordination Languages and Models, 1997, pp. 64-80
-
-
-
-
5
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Deng Y., Wang J., Tsai J.J.P., and Beznosov K. An approach for modeling and analysis of security system architectures. IEEE Transactions on Knowledge and Data Engineering 15 5 (2003) 1099-1119
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.2
Tsai, J.J.P.3
Beznosov, K.4
-
9
-
-
0035790756
-
Reusable component interconnection patterns for distributed software architectures
-
May 2001, ACM Press, Toronto, Canada
-
Gomaa H., Menasce D., and Shin E. Reusable component interconnection patterns for distributed software architectures. Proceedings ACM Symposium on Software Reusability. May 2001 (2001), ACM Press, Toronto, Canada 69-77
-
(2001)
Proceedings ACM Symposium on Software Reusability
, pp. 69-77
-
-
Gomaa, H.1
Menasce, D.2
Shin, E.3
-
10
-
-
85178869583
-
-
H. Gomaa, M.E. Shin, Multiple-view meta-modeling of software product lines, in: The 8th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2002, December 2002, Maryland
-
-
-
-
11
-
-
85178867631
-
-
H. Gomaa, M.E. Shin, Modeling complex systems by separating application and security concerns, in: The 9th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2004, April 2004, Italy
-
-
-
-
12
-
-
33947586630
-
-
J. Jürjens, UMLsec: Extending UML for secure systems development, UML 2002, September 30-October 4, 2002, Dresden
-
-
-
-
14
-
-
33947597316
-
-
T. Lodderstedt, D. Basin, J. Doser, SecureUML: A UML-based modeling language for model-driven security, in: The 5th International Conference on the Unified Modeling Language, September 30-October 4, Dresden, Germany, 2002
-
-
-
-
15
-
-
85045573601
-
-
J. McDermott, C. Fox, Using abuse case models for security requirements analysis, in: Proc. of the 15th Annual Computer Security Application Conference, 1999, pp. 55-66
-
-
-
-
16
-
-
33947599369
-
-
J.D. Moffett, C.B. Haley, B. Nuseibeh, Core Security Requirements Artefacts, Technical Report, The Open University, UK, 2004
-
-
-
-
17
-
-
34247119309
-
-
R. Pettit, H. Gomaa, Modeling behavioral design patterns of concurrent objects, in: Proc. International Conference on Software Engineering, May 2006, Shanghai, China
-
-
-
-
19
-
-
84977598117
-
Towards an architectural treatment of software security: A connector-centric approach
-
Software Engineering for Secure Systems. SESS05
-
Ren J., Taylor R., Dourish P., and Redmiles D. Towards an architectural treatment of software security: A connector-centric approach. Software Engineering for Secure Systems. SESS05. ACM SIGSOFT Software Engineering Notes 30 4 (2005)
-
(2005)
ACM SIGSOFT Software Engineering Notes
, vol.30
, Issue.4
-
-
Ren, J.1
Taylor, R.2
Dourish, P.3
Redmiles, D.4
-
20
-
-
33947580030
-
-
Rose Real Time, http://www-306.ibm.com/software/awdtools/developer/rose/, IBM, 2005
-
-
-
-
22
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., and Youman C.E. Role-based access control models. IEEE Computer 29 2 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
24
-
-
33947608815
-
-
M.E. Shin, Evolution in multiple-view models in software product families, Ph.D. Dissertation, George Mason University, Fairfax, VA, 2002
-
-
-
-
25
-
-
17444381627
-
Analyzing dynamic behavior of large-scale system through model transformation
-
Shin M.E., Levis A., Wagenhals L., and Kim D. Analyzing dynamic behavior of large-scale system through model transformation. International Journal of Software Engineering and Knowledge Engineering 15 1 (2005) 35-60
-
(2005)
International Journal of Software Engineering and Knowledge Engineering
, vol.15
, Issue.1
, pp. 35-60
-
-
Shin, M.E.1
Levis, A.2
Wagenhals, L.3
Kim, D.4
-
26
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G., and Opdahl A.L. Eliciting security requirements with misuse cases. Requirements Engineering 10 1 (2005) 34-44
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
28
-
-
33947596512
-
-
T. Srivatanakul, J.A. Clark, F. Polack, Writing effective security abuse cases, Technical Report YCS-2004-375, University of York, 2004
-
-
-
|