-
1
-
-
35048861871
-
Just Fast Keying in the Pi Calculus
-
Proceedings of the 13th European Symposium on Programming ESOP'04, of, Spain
-
Abadi M., Blanchet B., and Fournet C. Just Fast Keying in the Pi Calculus. Proceedings of the 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes on Computer Science, Spain, 2004.
-
(2004)
Lecture Notes on Computer Science
, vol.2986
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
2
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander, I., Misuse cases: Use cases with hostile intent. IEEE Software, 20, 58-66, 2003.
-
(2003)
IEEE Software
, vol.20
, pp. 58-66
-
-
Alexander, I.1
-
3
-
-
34548774558
-
-
Anderson, R, Security Engineering: A guide to Building Dependable Distributed Systems. Wiley Computer Publishing
-
Anderson, R., Security Engineering: A guide to Building Dependable Distributed Systems. Wiley Computer Publishing.
-
-
-
-
4
-
-
34548755076
-
-
AVISPA
-
AVISPA, http://www.avispa-project.org.
-
-
-
-
6
-
-
84905494891
-
Improving Computer Security Using Extended Static Checking
-
IEEE CS Press
-
Chess B., Improving Computer Security Using Extended Static Checking, Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy
-
-
Chess, B.1
-
9
-
-
0022706656
-
Automatic Verification of Finite-State Concurrent Systems Using temporal Logic Specifications
-
Clarke, E.M., Emerson, E.A, and Sistla, A.P. Automatic Verification of Finite-State Concurrent Systems Using temporal Logic Specifications. ACM Transactions on Programming Languages and Systems, 8(2): 244-263, 1986.
-
(1986)
ACM Transactions on Programming Languages and Systems
, vol.8
, Issue.2
, pp. 244-263
-
-
Clarke, E.M.1
Emerson, E.A.2
Sistla, A.P.3
-
10
-
-
0141733117
-
Modelling Access Policies Using Roles in Requirements Engineering
-
Crook, R., Ince, D., and Nuseibeh, B., Modelling Access Policies Using Roles in Requirements Engineering. Information and Software Technology, 45(14), 979-991, 2003.
-
(2003)
Information and Software Technology
, vol.45
, Issue.14
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
13
-
-
0032667112
-
Patterns in Property Specifications for Finite State Verification
-
May
-
Dwyer, M.B., Avrunim, G.S., and Corbett, J.C., Patterns in Property Specifications for Finite State Verification, in Proc. of the 21st International Conference on Software engineering (ICSE'99), May 1999.
-
(1999)
Proc. of the 21st International Conference on Software engineering (ICSE'99)
-
-
Dwyer, M.B.1
Avrunim, G.S.2
Corbett, J.C.3
-
14
-
-
33845258109
-
A Methodology to Develop secure Systems Using Patterns
-
editors H. Mouratidis and P. Giorgini, ISBN 1-59904-147-2
-
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., and Vanhilst, M., A Methodology to Develop secure Systems Using Patterns, in Integrating Security and Software Engineering Advances and Future Visions, editors H. Mouratidis and P. Giorgini, ISBN 1-59904-147-2, 2007.
-
(2007)
Integrating Security and Software Engineering Advances and Future Visions
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Vanhilst, M.4
-
15
-
-
0142156745
-
Requirements Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard
-
Proceedings on the International Conference on Conceptual Modelling ER, Springer-Verlag
-
Giorgini, P., Massaci, F., and Mylopoulos, J., Requirements Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard, Proceedings on the International Conference on Conceptual Modelling (ER), LNCS 2813, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2813
-
-
Giorgini, P.1
Massaci, F.2
Mylopoulos, J.3
-
16
-
-
84899405437
-
Modelling Security and Trust with Secure Tropos
-
editors H. Mouratidis and P. Giorgini, ISBN 1-59904-147-2
-
Giorgini, P., Mouratidis, H., and Zannone, N., Modelling Security and Trust with Secure Tropos, in Integrating Security and Software Engineering Advances and Future Visions, editors H. Mouratidis and P. Giorgini, ISBN 1-59904-147-2, 2007.
-
(2007)
Integrating Security and Software Engineering Advances and Future Visions
-
-
Giorgini, P.1
Mouratidis, H.2
Zannone, N.3
-
17
-
-
0032623470
-
Security Protocols Over Open Networks and Distributed Systems: Formal Methods for their Analysis, Design, and Verification
-
Gritzalis, S., Spinellis, S., Georgiadis P., Security Protocols Over Open Networks and Distributed Systems: Formal Methods for their Analysis, Design, and Verification. Computer Communications, 22(8): 695-707, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 695-707
-
-
Gritzalis, S.1
Spinellis, S.2
Georgiadis, P.3
-
18
-
-
34548744058
-
-
Heitmeyer, C, Applying Practical Formal Methods to the Specification and Analysis of Security Porperties
-
Heitmeyer, C., Applying Practical Formal Methods to the Specification and Analysis of Security Porperties.
-
-
-
-
20
-
-
34548757952
-
-
Jayaram K.R. and Mathur A.P., Software Engineering for Secure Software - State of the Art: A Survey. Technical report of CERIAS (Purdue University) and SERC, 2005.
-
Jayaram K.R. and Mathur A.P., Software Engineering for Secure Software - State of the Art: A Survey. Technical report of CERIAS (Purdue University) and SERC, 2005.
-
-
-
-
22
-
-
35048858856
-
Automated Verification of UMLsec Models for Security Requirements
-
Proceedings of the Unified Modelling Language Conference UML, Lisbon, Portugal, Springer-Verlag
-
Jurjens, J. and Shabalin P. Automated Verification of UMLsec Models for Security Requirements, Proceedings of the Unified Modelling Language Conference (UML 2004), Lisbon, Portugal, LNCS, Springer-Verlag. 2004.
-
(2004)
LNCS
-
-
Jurjens, J.1
Shabalin, P.2
-
23
-
-
34548708551
-
-
Lodderstedt, T., Basin, D., and Dorser, J., SecureUML: A UML-based Modelling Language for Model Driven Security, Proceedings on the UML'02 Conference, LNCS 2460, Springer-Verlag.
-
Lodderstedt, T., Basin, D., and Dorser, J., SecureUML: A UML-based Modelling Language for Model Driven Security, Proceedings on the UML'02 Conference, LNCS 2460, Springer-Verlag.
-
-
-
-
26
-
-
23944475544
-
When Security Meets Software Engineering: A Case of Modelling Secure Information Systems
-
Mouratidis, H., Giorgini, P., and Manson, G., When Security Meets Software Engineering: A Case of Modelling Secure Information Systems. Information Systems, 30(8), 609-629, 2005.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
28
-
-
34548803562
-
-
PEPERS
-
PEPERS. http://www.pepers.org/.
-
-
-
-
30
-
-
24944508565
-
-
Senn D., Basin D. and Caronni G., Firewall Conformance Testing, in TestCom, pp. 226-241, 2005.
-
Senn D., Basin D. and Caronni G., Firewall Conformance Testing, in TestCom, pp. 226-241, 2005.
-
-
-
-
31
-
-
34548734213
-
-
SPIN
-
SPIN. http://spinroot.com/spin/whatispin.html
-
-
-
-
32
-
-
35048897235
-
-
Computer Security Division, Information Technology laboratory National Institute of Standards and Technology
-
Stoneburner, G., Hayden, C., and Feringa, A., Engineering principles for Information Technology Security (A Baseline for Achieving Security), Computer Security Division, Information Technology laboratory National Institute of Standards and Technology, 2001.
-
(2001)
Engineering principles for Information Technology Security (A Baseline for Achieving Security)
-
-
Stoneburner, G.1
Hayden, C.2
Feringa, A.3
-
33
-
-
0034291619
-
-
TSE
-
Van Lamsweerde, A., and Letelier E., Handling Obstacles in Goal-Oriented Requirements Engineering, TSE, 26(10), 2000.
-
(2000)
Handling Obstacles in Goal-Oriented Requirements Engineering
, vol.26
, Issue.10
-
-
Van Lamsweerde, A.1
Letelier, E.2
-
34
-
-
0000848453
-
An automata-theoretic approach to linear temporal logic
-
Vardi, M.Y., An automata-theoretic approach to linear temporal logic. In Banff Higher Order Workshop, pages 238-266, 1995.
-
(1995)
Banff Higher Order Workshop
, pp. 238-266
-
-
Vardi, M.Y.1
-
36
-
-
34548786191
-
-
editors H. Mouratidis and P. Giorgini, ISBN 1-59904-147-2
-
Yu E., Liu L., Mylopoulos, J., A Social Ontology for Integrating Security and Software Engineering, in in Integrating Security and Software Engineering Advances and Future Visions, editors H. Mouratidis and P. Giorgini, ISBN 1-59904-147-2, 2007.
-
(2007)
A Social Ontology for Integrating Security and Software Engineering, in in Integrating Security and Software Engineering Advances and Future Visions
-
-
Yu, E.1
Liu, L.2
Mylopoulos, J.3
|