-
1
-
-
84861177764
-
ProcessNFL: A Language for Describing Non-Functional Properties
-
Hawaii
-
Rosa, N., Cunha, P., and Justo, G., "ProcessNFL: A Language for Describing Non-Functional Properties", Proceedings of the 35th Hawaii International Conference on System Sciences, Hawaii, 2002.
-
(2002)
Proceedings of the 35th Hawaii International Conference on System Sciences
-
-
Rosa, N.1
Cunha, P.2
Justo, G.3
-
2
-
-
0344429771
-
OMG Unified Modeling Language Specification
-
OMG, Technical report, Object Management Group, March
-
OMG, OMG Unified Modeling Language Specification, Technical report, Object Management Group, March 2003.
-
(2003)
-
-
-
3
-
-
0010518517
-
Attack Languages
-
Boston, MA, October
-
Vigna, G., Eckmann, S.T., and Kemmerer, R.A., "Attack Languages", Proceedings of the IEEE Information Survivability Workshop, Boston, MA, October 2000.
-
(2000)
Proceedings of the IEEE Information Survivability Workshop
-
-
Vigna, G.1
Eckmann, S.T.2
Kemmerer, R.A.3
-
4
-
-
0003516333
-
Intrusion Detection Systems: A Survey and Taxonomy
-
Technical report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March
-
Axelsson S., Intrusion Detection Systems: A Survey and Taxonomy, Technical report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March 2000.
-
(2000)
-
-
Axelsson, S.1
-
5
-
-
34250026474
-
-
Zulkeraine, M. and Ahamed, S., Software Security Engineering: Towards Unifying Software Engineering with Security Engineering, Chapter in M. Warkentin and R. Vaughn (editors), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, (to appear) Idea Group Publishing, 2005.
-
Zulkeraine, M. and Ahamed, S., "Software Security Engineering: Towards Unifying Software Engineering with Security Engineering", Chapter in M. Warkentin and R. Vaughn (editors), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, (to appear) Idea Group Publishing, 2005.
-
-
-
-
6
-
-
33847631104
-
Detecting Intrusions Specified in a Software Specification Language
-
IEEE CS Press, Edinburgh, Scotland, July
-
Raihan, M. and Zulkernine, M., "Detecting Intrusions Specified in a Software Specification Language", Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC '05), IEEE CS Press, Edinburgh, Scotland, July 2005.
-
(2005)
Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC '05)
-
-
Raihan, M.1
Zulkernine, M.2
-
7
-
-
34248526735
-
Applying AsmL Specification for Automatic Intrusion Detection
-
Linz, Austria, September
-
Zhang, Q. and Zulkeraine, M., "Applying AsmL Specification for Automatic Intrusion Detection", Proceedings of the Workshop on Specification and Automated Processing of Security Requirements, pp. 221-233, Linz, Austria, September 2004.
-
(2004)
Proceedings of the Workshop on Specification and Automated Processing of Security Requirements
, pp. 221-233
-
-
Zhang, Q.1
Zulkeraine, M.2
-
8
-
-
34250024067
-
-
OMG, UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, Technical report, Object Management Group, September
-
OMG, UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, Technical report, Object Management Group, September 2004.
-
(2004)
-
-
-
9
-
-
84892793192
-
A UML Profile for the Identification and Analysis of Security Risks during Structured Brainstorming
-
Technical report, SINTEF ICT, May 2004
-
Lund, M., Braber, F., Stolen, K., and Vraalsen, F., A UML Profile for the Identification and Analysis of Security Risks during Structured Brainstorming, Technical report, SINTEF ICT, May 2004.
-
-
-
Lund, M.1
Braber, F.2
Stolen, K.3
Vraalsen, F.4
-
10
-
-
24944549262
-
UML Profile for Security Assessment
-
Technical report, SINTEF ICT, November 2003
-
Lund, M., Hogganvik, I., Seehusen, F., and Stolen, K., UML Profile for Security Assessment, Technical report, SINTEF ICT, November 2003.
-
-
-
Lund, M.1
Hogganvik, I.2
Seehusen, F.3
Stolen, K.4
-
11
-
-
84944220091
-
Towards Development of Secure Systems using UML
-
H. Hubmann, editor, Fundamental Approaches to Software Engineering FASE/ETAPS, International conference, Springer, Genova, Italy
-
Jurjens, J., "Towards Development of Secure Systems using UML", In H. Hubmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International conference), Lecture Notes in Computer Scinece, Springer, Genova, Italy, 2001.
-
(2001)
Lecture Notes in Computer Scinece
-
-
Jurjens, J.1
-
13
-
-
0242625201
-
Model Driven Security for Process-Oriented Systems
-
Como, Italy
-
Baser, D., Doser, J., and Lodderstedt, T., "Model Driven Security for Process-Oriented Systems", Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, Como, Italy, 2003.
-
(2003)
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies
-
-
Baser, D.1
Doser, J.2
Lodderstedt, T.3
-
14
-
-
79955143136
-
Secure UML: A UML-based Modeling Language for Model-Driven Security
-
Proceedings of the 5th International UML Conference, Springer, Dresden, Germany
-
Lodderstedt, T., Basin, D., and Doser, J., "Secure UML: A UML-based Modeling Language for Model-Driven Security", Proceedings of the 5th International UML Conference, Lecture Notes in Computer Scinece, Springer, Dresden, Germany, 2002.
-
(2002)
Lecture Notes in Computer Scinece
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
15
-
-
3042529796
-
Using UML to Reflect Non-Functional Requirements
-
Toronto, Canada
-
Cysneiros, L.M. and Leitte, J.C., "Using UML to Reflect Non-Functional Requirements", Proceedings of the GASCON 2001, Toronto, Canada, 2001.
-
(2001)
Proceedings of the GASCON
-
-
Cysneiros, L.M.1
Leitte, J.C.2
-
17
-
-
85045573601
-
Using Abuse Case Models for Security Requirements Analysis
-
Phoenix, Arizona
-
Dermott, J. and Fox, C., "Using Abuse Case Models for Security Requirements Analysis", 15th Annual Computer Security Applications Conference, Phoenix, Arizona, 1999.
-
(1999)
15th Annual Computer Security Applications Conference
-
-
Dermott, J.1
Fox, C.2
-
18
-
-
34249981789
-
Using Security Patterns to Model and Analyze Security Requirements
-
Technical Report MSU-CSE-03-18, Software Engineering and Network Systems Laboratory, Michigan State University
-
Cheng, B., Konrad, S., Cample, L., and Wassermann, R., Using Security Patterns to Model and Analyze Security Requirements, Technical Report MSU-CSE-03-18, Software Engineering and Network Systems Laboratory, Michigan State University, 2003.
-
(2003)
-
-
Cheng, B.1
Konrad, S.2
Cample, L.3
Wassermann, R.4
-
21
-
-
0003993827
-
-
MIT Lincoln Laboratory
-
MIT Lincoln Laboratory, DARPA Intrusion Detection Evaluation. (http://www.ll.mit.edu/IST/ideval/), 1999.
-
(1999)
DARPA Intrusion Detection Evaluation
-
-
-
22
-
-
34250014444
-
-
Eckmann, S., Vigna, G., and Kemmerer, R., STATL. Technical report, University of California Santa Barbara, CA, 2000.
-
Eckmann, S., Vigna, G., and Kemmerer, R., STATL. Technical report, University of California Santa Barbara, CA, 2000.
-
-
-
-
23
-
-
0004204715
-
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, Master's Thesis
-
June
-
Kendall, K., A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, Master's Thesis, MIT, June 1999.
-
(1999)
MIT
-
-
Kendall, K.1
|