-
2
-
-
34250637809
-
-
SSADM-CRAMM subject guide for SSADM version 3 and GRAMM version 2. Technical report, Central Computer and Telecommunications Agency, IT Security and Privacy Group., 1991.
-
SSADM-CRAMM subject guide for SSADM version 3 and GRAMM version 2. Technical report, Central Computer and Telecommunications Agency, IT Security and Privacy Group., 1991.
-
-
-
-
3
-
-
34250635370
-
-
CRAMM. Technical Report, Insight Consulting Limited
-
CRAMM. Technical Report http://www.cramm.com, Insight Consulting Limited, 2003.
-
(2003)
-
-
-
4
-
-
33746243592
-
Extreme programming and refactoring for building secure web-based applications and web services
-
Thesis, Computer Science Department, University of York
-
E. Aydal. Extreme programming and refactoring for building secure web-based applications and web services. MSc in Software Engineering Thesis, Computer Science Department, University of York, 2005.
-
(2005)
MSc in Software Engineering
-
-
Aydal, E.1
-
5
-
-
0034970941
-
Extending UML for modeling web applications
-
Maui, Hawaii, USA, January, IEEE
-
L. Baresi, F. Garzotto, and P. Paolini. Extending UML for modeling web applications. In Proceeding of 34th Annual Hawaii International Conference on System Sciences (HICSS-34)-Volume 3, Maui, Hawaii, USA, January 2001. IEEE.
-
(2001)
Proceeding of 34th Annual Hawaii International Conference on System Sciences (HICSS-34)
, vol.3
-
-
Baresi, L.1
Garzotto, F.2
Paolini, P.3
-
6
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
R. Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4):375-414, 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
7
-
-
34250664916
-
-
K. Beznosov. extreme Security Engineering. In Proceeding of First ACM BizSec Workshop, Fairfax VA, USA, October 2003.
-
K. Beznosov. extreme Security Engineering. In Proceeding of First ACM BizSec Workshop, Fairfax VA, USA, October 2003.
-
-
-
-
8
-
-
84945122170
-
Operationally critical threat, asset, and vulnerability evaluation (OCTAVE)
-
CERT Coordination Centre, Technical Report, Software Engineering Institute, CERT Coordination Centre
-
CERT Coordination Centre. Operationally critical threat, asset, and vulnerability evaluation (OCTAVE). Technical Report http://www.cert.org/octave/, Software Engineering Institute, CERT Coordination Centre, 2003.
-
(2003)
-
-
-
9
-
-
34250647985
-
Security and systems engineering
-
Technical Report YCS378, Department of Computer Science, University of York, June
-
H. Chivers. Security and systems engineering. Technical Report YCS378, Department of Computer Science, University of York, June 1994.
-
(1994)
-
-
Chivers, H.1
-
10
-
-
26444465547
-
-
H. Chivers, R. Paige, and X. Ge. Agile security using an incremental security architecture. In Proceeding of the Sixth International Conference on eXtreme Programming and Agile Processes in Software Engineering (XP2005), Spring-Verlag LNCS 3556, pages 57-65, Sheffield, UK, 2005.
-
H. Chivers, R. Paige, and X. Ge. Agile security using an incremental security architecture. In Proceeding of the Sixth International Conference on eXtreme Programming and Agile Processes in Software Engineering (XP2005), Spring-Verlag LNCS 3556, pages 57-65, Sheffield, UK, 2005.
-
-
-
-
11
-
-
0027282863
-
HDM model-based approach to hypertext application design
-
F. Garzotto, P. Paolini, and D. Schwabe. HDM model-based approach to hypertext application design. ACM Trans. Inf. Syst., 11(1): 1-26, 1993.
-
(1993)
ACM Trans. Inf. Syst
, vol.11
, Issue.1
, pp. 1-26
-
-
Garzotto, F.1
Paolini, P.2
Schwabe, D.3
-
13
-
-
34250657925
-
-
T. Grance, J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Technical report, National Institute of Standards and Technology (NIST), Special Publication 800-64, October 2003. (revision 1 released June 2004).
-
T. Grance, J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Technical report, National Institute of Standards and Technology (NIST), Special Publication 800-64, October 2003. (revision 1 released June 2004).
-
-
-
-
14
-
-
34250654798
-
-
B. S. Institution. Information security mangement part 2: Specification for information security management systems. Technical report, BS 7799-2:1999, 1999.
-
B. S. Institution. Information security mangement part 2: Specification for information security management systems. Technical report, BS 7799-2:1999, 1999.
-
-
-
-
17
-
-
33847326664
-
Agile web engineering (AWE) process
-
Technical report, Department of Computer Science, University of Glasgow, UK, December
-
A. McDonald and R. Welland. Agile web engineering (AWE) process. Technical report, Department of Computer Science, University of Glasgow, UK, December 2001.
-
(2001)
-
-
McDonald, A.1
Welland, R.2
-
18
-
-
34250651976
-
Towards agile reengineering of dependable grid applications
-
CNAM, Paris, November
-
R. Paige, J. Cakic, X. Ge, and H. Chivers. Towards agile reengineering of dependable grid applications. In Proceeding of 17th International Conference of Software and System Engineering and Their Applications (ICSSEA), CNAM, Paris, November 2004.
-
(2004)
Proceeding of 17th International Conference of Software and System Engineering and Their Applications (ICSSEA)
-
-
Paige, R.1
Cakic, J.2
Ge, X.3
Chivers, H.4
-
21
-
-
1842829828
-
Risk management guide for information technology systems. Technical report, National Institute of Standards and Technology (NIST)
-
July
-
G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. Technical report, National Institute of Standards and Technology (NIST), Special Publication 800-30, July 2002.
-
(2002)
Special Publication
, vol.800 -30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
|