-
2
-
-
34547487058
-
Using model-based security analysis in component-oriented system development, a case-based evaluation
-
Technical Report 342, University of Oslo, Department of Informatics
-
G. Brændeland and K. Stølen. Using model-based security analysis in component-oriented system development, a case-based evaluation. Technical Report 342, University of Oslo, Department of Informatics, 2006.
-
(2006)
-
-
Brændeland, G.1
Stølen, K.2
-
3
-
-
0004181454
-
UML Components. A simple process for specifying component-based software
-
Addison-Wesley
-
J. Cheesman and J. Daniels. UML Components. A simple process for specifying component-based software. Component software series. Addison-Wesley, 2001.
-
(2001)
Component software series
-
-
Cheesman, J.1
Daniels, J.2
-
4
-
-
17644411406
-
Model-based performance risk analysis
-
V. Cortellessa, K. Goseva-Popstojanova, K. Appukkutty, A. Guedem, A. E. Hassan, R. Elnaggar, W. Abdelmoez, and H. H. Ammar. Model-based performance risk analysis. IEEE Transactions on Software Engineering, 31(1):3-20, 2005.
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.1
, pp. 3-20
-
-
Cortellessa, V.1
Goseva-Popstojanova, K.2
Appukkutty, K.3
Guedem, A.4
Hassan, A.E.5
Elnaggar, R.6
Abdelmoez, W.7
Ammar, H.H.8
-
5
-
-
34547406903
-
-
F. den Braber, T. Dimitrakos, B. A. Gran, M. S. Lund, K. Stolen, and J. Ø. Aagedal. UML and the Unified Process, chapter The CORAS methodology: model-based risk management using UML and UP, pages 332-357. IRM Press, 2003.
-
F. den Braber, T. Dimitrakos, B. A. Gran, M. S. Lund, K. Stolen, and J. Ø. Aagedal. UML and the Unified Process, chapter The CORAS methodology: model-based risk management using UML and UP, pages 332-357. IRM Press, 2003.
-
-
-
-
6
-
-
0242411475
-
Architectural-level risk analysis using UML
-
K. Goseva-Popstojanova, A. E. Hassan, A. Guedem, W. Abdelmoez, D. E. M. Nasser, H. H. Ammar, and A. Mili. Architectural-level risk analysis using UML. IEEE Transactions on Software Engineering, 29(10):946-960, 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.10
, pp. 946-960
-
-
Goseva-Popstojanova, K.1
Hassan, A.E.2
Guedem, A.3
Abdelmoez, W.4
Nasser, D.E.M.5
Ammar, H.H.6
Mili, A.7
-
7
-
-
24944476741
-
Why timed sequence diagrams require three-event semantics
-
Technical Report 309, University of Oslo, Department of Informatics
-
Ø. Haugen, K. E. Husa, R. K. Runde, and K. Stølen. Why timed sequence diagrams require three-event semantics. Technical Report 309, University of Oslo, Department of Informatics, 2004.
-
(2004)
-
-
Haugen, O.1
Husa, K.E.2
Runde, R.K.3
Stølen, K.4
-
8
-
-
0242339578
-
-
Ø. Haugen and K. Stølen. STAIRS - steps to analyze interactions with refinement semantics. In UML, 2863 of Lecture Notes in Computer Science, pages 388-402. Springer, 2003.
-
Ø. Haugen and K. Stølen. STAIRS - steps to analyze interactions with refinement semantics. In UML, volume 2863 of Lecture Notes in Computer Science, pages 388-402. Springer, 2003.
-
-
-
-
9
-
-
34547428174
-
Information Technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management,
-
ISO/IEC, TR 13335-1
-
ISO/IEC. Information Technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management, 2004. TR 13335-1.
-
(2004)
-
-
-
12
-
-
79955143136
-
-
T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In UML, 2460 of Lecture Notes in Computer Science, pages 426-441. Springer, 2002.
-
T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In UML, volume 2460 of Lecture Notes in Computer Science, pages 426-441. Springer, 2002.
-
-
-
-
13
-
-
84949225186
-
Abuse-case-based assurance arguments
-
IEEE Computer Society
-
J. P. McDermott. Abuse-case-based assurance arguments. In ACSAC, pages 366-376. IEEE Computer Society, 2001.
-
(2001)
ACSAC
, pp. 366-376
-
-
McDermott, J.P.1
-
14
-
-
85045573601
-
-
J. P. McDermott and C. Fox. Using abuse case models for security requirements analysis. In ACSAC, pages 55-. IEEE Computer Society, 1999.
-
J. P. McDermott and C. Fox. Using abuse case models for security requirements analysis. In ACSAC, pages 55-. IEEE Computer Society, 1999.
-
-
-
-
15
-
-
34547700307
-
-
G. McGraw. Sofware security: Building security in. Software security. Adison-Wesley, 2006.
-
G. McGraw. Sofware security: Building security in. Software security. Adison-Wesley, 2006.
-
-
-
-
17
-
-
33745443561
-
Specification and refinement of soft real-time requirements using sequence diagrams
-
FORMATS, of, Springer
-
A. Refsdal, K. E. Husa, and K. Stølen. Specification and refinement of soft real-time requirements using sequence diagrams. In FORMATS, volume 3829 of Lecture Notes in Computer Science, pages 32-48. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3829
, pp. 32-48
-
-
Refsdal, A.1
Husa, K.E.2
Stølen, K.3
-
20
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
21
-
-
34547465824
-
-
Standards Australia, Standards New Zealand. Information security risk management guidelines, 2004. HB 231:2004.
-
Standards Australia, Standards New Zealand. Information security risk management guidelines, 2004. HB 231:2004.
-
-
-
-
22
-
-
34547438943
-
-
Symantec internet security threat report. Trends for July 05-December 05, March 2006
-
Symantec. Symantec internet security threat report. Trends for July 05-December 05, March 2006.
-
-
-
Symantec1
|