-
1
-
-
84948972584
-
Security requirements engineering: When anti-requirements hit the fan
-
R. Crook, D. Ince, L. Lin, and B. Nuseibeh, "Security requirements engineering: When anti-requirements hit the fan," in Proceedings of IEEE Int. Requirements Engineering Conference (RE'02), 2002.
-
(2002)
Proceedings of IEEE Int. Requirements Engineering Conference (RE'02)
-
-
Crook, R.1
Ince, D.2
Lin, L.3
Nuseibeh, B.4
-
3
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Jan
-
G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," Requirements Engineering Journal, vol. 10, no. 1, Jan 2005.
-
(2005)
Requirements Engineering Journal
, vol.10
, Issue.1
-
-
Sindre, G.1
Opdahl, A.L.2
-
4
-
-
27644544786
-
Analyzing security requirements as relationships among strategic actors
-
Raleigh, NC
-
L. Liu, E. Yu, and J. Mylopoulos, "Analyzing security requirements as relationships among strategic actors," in 2nd Symposium on Requirements Eng. for Information Security (SREIS-02), Raleigh, NC, 2002.
-
(2002)
2nd Symposium on Requirements Eng. for Information Security (SREIS-02)
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
5
-
-
2942757657
-
Engineering security requirements
-
Jan-Feb
-
D. G. Firesmith, "Engineering security requirements," Journal of Object Technology, vol. 2, no. 1, pp. 53-58, Jan-Feb 2003.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-58
-
-
Firesmith, D.G.1
-
6
-
-
33947648196
-
-
Online, Available
-
M. D. Quel, "The sans policy primer," 2001. [Online]. Available: http://www.sans.org/resources/policies/PolicyPrimer.pdf
-
(2001)
The sans policy primer
-
-
Quel, M.D.1
-
8
-
-
79955143136
-
Secureuml: A uml-based modeling language for model-driven security
-
2460, Springer-Verlag, pp
-
T. Lodderstedt, D. Basin, and J. Doser, "Secureuml: A uml-based modeling language for model-driven security," UML 2002, LNCS 2460, Springer-Verlag, pp. 426-441, 2002.
-
(2002)
LNCS
, vol.UML 2002
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
9
-
-
79955163100
-
Umlsec: Extending uml for secure systems development
-
2460, Springer-Verlag
-
J. Jrjens, "Umlsec: Extending uml for secure systems development," UML 2002, LNCS 2460, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.UML 2002
-
-
Jrjens, J.1
-
10
-
-
27744457563
-
Integrating security in the development process with uml
-
F. den Braber, M. S. Lund, K. Stølen, and F. Vraalsen, "Integrating security in the development process with uml," in Encyclopedia of Information Science and Technology (III), 2005, pp. 1560-1566.
-
(2005)
Encyclopedia of Information Science and Technology (III)
, pp. 1560-1566
-
-
den Braber, F.1
Lund, M.S.2
Stølen, K.3
Vraalsen, F.4
-
11
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
Proceedings of iTrust'04
-
P. G. F. Massacci, J. Mylopoulos, and N. Zannone, "Requirements engineering meets trust management: Model, methodology, and reasoning." in Proceedings of iTrust'04, LNCS 2995, 2004, pp. 176-190.
-
(2004)
LNCS
, vol.2995
, pp. 176-190
-
-
Massacci, P.G.F.1
Mylopoulos, J.2
Zannone, N.3
-
12
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
IEEE Press
-
L. Liu, E. Yu, and J. Mylopoulos, "Security and privacy requirements analysis within a social setting," in Proceedings of RE'03, IEEE Press, 2003, pp. 151-161.
-
(2003)
Proceedings of RE'03
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
13
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
IEEE Press
-
P. G. F. Massacci, J. Mylopoulos, and N. Zannone, "Modeling security requirements through ownership, permission and delegation," in Proceedings of RE'05, IEEE Press, 2005.
-
(2005)
Proceedings of RE'05
-
-
Massacci, P.G.F.1
Mylopoulos, J.2
Zannone, N.3
-
14
-
-
27644540336
-
On modeling access policies: Relating roles to their organizational context
-
IEEE Press
-
R. Crook, D. Ince, and B. Nuseibeh, "On modeling access policies: Relating roles to their organizational context," in Proceedings of RE'05, IEEE Press, 2005.
-
(2005)
Proceedings of RE'05
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
16
-
-
0033333334
-
Conflicts in policy-based distibuted systems management
-
Nov
-
E. Lupu and M. Sloman, "Conflicts in policy-based distibuted systems management," Transactions on Software Engineering - Special Issue on Inconsistency Management, vol. 25, no. 6, pp. 852-869, Nov. 1999.
-
(1999)
Transactions on Software Engineering - Special Issue on Inconsistency Management
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.1
Sloman, M.2
-
18
-
-
84944048132
-
The ponder policy specification language
-
Policy Workshop 2001, Bristol, U.K, Springer-Verlag, Jan
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The ponder policy specification language," Policy Workshop 2001, Bristol, U.K., Springer-Verlag, LNCS, Jan. 2001.
-
(2001)
LNCS
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
20
-
-
0034837933
-
Goal-oriented requirements engineering: A guided tour
-
Toronto: IEEE Press
-
A. van Lamsweerde, "Goal-oriented requirements engineering: A guided tour," in Proceedings of RE'01. Toronto: IEEE Press, 2001.
-
(2001)
Proceedings of RE'01
-
-
van Lamsweerde, A.1
-
21
-
-
33745127388
-
Representing nfrs and frs: A goal-oriented and use case driven approach
-
Software Engineering Research and Applications SERA
-
L. Chung and S. Supakkul, "Representing nfrs and frs: A goal-oriented and use case driven approach," Software Engineering Research and Applications (SERA'2004)- LNCS, vol. 3647, pp. 29-41, 2005.
-
(2004)
LNCS
, vol.3647
, pp. 29-41
-
-
Chung, L.1
Supakkul, S.2
-
23
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder, "The protection of information in computer systems." in Proceedings of the IEEE, vol. 63(9), 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.D.2
|