-
1
-
-
38049152207
-
-
C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson. Operationally critical threat, asset, and vulnerability evaluation (octave) framework. Technical Report CMU/SEI-99-TR-017, SEL Carnegie Mellon University, May 2005.
-
C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson. Operationally critical threat, asset, and vulnerability evaluation (octave) framework. Technical Report CMU/SEI-99-TR-017, SEL Carnegie Mellon University, May 2005.
-
-
-
-
7
-
-
0027574423
-
Goal-directed requirements acquisition
-
A. Dardenne, A. van Lamsweerde, and S. Fickas. Goal-directed requirements acquisition. Science of Computer Programming, 20(1-2):3-50, 1993.
-
(1993)
Science of Computer Programming
, vol.20
, Issue.1-2
, pp. 3-50
-
-
Dardenne, A.1
van Lamsweerde, A.2
Fickas, S.3
-
8
-
-
27744457563
-
Integrating security in the development process with UML
-
F. den Braber, M. S. Lund, K. Stølen, and F. Vraalsen. Integrating security in the development process with UML. In Encyclopedia of Information Science and Technology (III), pages 1560-1566, 2005.
-
(2005)
Encyclopedia of Information Science and Technology (III)
, pp. 1560-1566
-
-
den Braber, F.1
Lund, M.S.2
Stølen, K.3
Vraalsen, F.4
-
11
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
2460, Springer-Verlag
-
J. Jrjens. UMLsec: Extending UML for secure systems development. UML 2002, LNCS 2460, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.UML 2002
-
-
Jrjens, J.1
-
12
-
-
38049131510
-
-
M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical report. Software Eng. Institute, Carnegie Mellon University, May 2005.
-
M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical report. Software Eng. Institute, Carnegie Mellon University, May 2005.
-
-
-
-
13
-
-
12844284330
-
A taxonomy of computer program security flaws, with examples
-
Technical Report NRL/FR/5542-93-9591, Naval Research Laboratory, Washington, DC, Nov
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws, with examples. Technical Report NRL/FR/5542-93-9591, Naval Research Laboratory, Washington, DC, Nov. 1993.
-
(1993)
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
15
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
2460, Springer-Verlag
-
T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. UML 2002, LNCS 2460, Springer-Verlag, pages 426-441, 2002.
-
(2002)
LNCS
, vol.UML 2002
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
16
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
Proceedings of iTrust'04
-
P. G. F. Massacci, J. Mylopoulos, and N. Zannone. Requirements engineering meets trust management: Model, methodology, and reasoning. In Proceedings of iTrust'04, LNCS 2995, pages 176-190, 2004.
-
(2004)
LNCS
, vol.2995
, pp. 176-190
-
-
Massacci, P.G.F.1
Mylopoulos, J.2
Zannone, N.3
-
19
-
-
38049159507
-
-
A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-OOT, Software Engineering Institute, Carnegie Mellon University, March 2001.
-
A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-OOT, Software Engineering Institute, Carnegie Mellon University, March 2001.
-
-
-
-
20
-
-
33747329910
-
Threat modeling as a basis for security requirements
-
Paris, France, Aug
-
S. Myagmar, A. Lee, and W. Yurcik. Threat modeling as a basis for security requirements. In Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'05), Paris, France, Aug. 2005.
-
(2005)
Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'05)
-
-
Myagmar, S.1
Lee, A.2
Yurcik, W.3
-
21
-
-
38049155208
-
-
NIST Software errors costs U.S. economy $59.5 billion annually. Technical Report NIST 2002-10, National Institute of Standards and Technology, June 2002.
-
NIST Software errors costs U.S. economy $59.5 billion annually. Technical Report NIST 2002-10, National Institute of Standards and Technology, June 2002.
-
-
-
-
23
-
-
38049168293
-
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobbs Journal, pages 21-29, December 1999.
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobbs Journal, pages 21-29, December 1999.
-
-
-
-
24
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
January
-
G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, January 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
25
-
-
0003618149
-
Scenario-based requirements analysis
-
A. Sutcliffe. Scenario-based requirements analysis. Requirements Engineering, 3(1):48-65, 1995.
-
(1995)
Requirements Engineering
, vol.3
, Issue.1
, pp. 48-65
-
-
Sutcliffe, A.1
-
27
-
-
14744271048
-
Application penetration testing
-
66-69
-
H. H. Thompson. Application penetration testing. IEEE Security and Privacy, 03(1):66-69, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
-
-
Thompson, H.H.1
-
28
-
-
27644580707
-
Demystifying the threat-modeling process
-
66-70, Sept/Oct
-
P. Torr. Demystifying the threat-modeling process. IEEE Security and Privacy, 03(5):66-70, Sept/Oct 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
-
-
Torr, P.1
-
31
-
-
17744386105
-
From system goals to intruder Anti-Goals: Attack generation and resolution for security requirements engineering
-
Monterey CA, Sept
-
A. van Lamsweerde, S. Brohez, R. D. Landtsheer, and D. Janssens. From system goals to intruder Anti-Goals: Attack generation and resolution for security requirements engineering. In Proc. of the Workshop on Requirements for High Assurance Systems (RHAS'03), Monterey (CA), Sept. 2003.
-
(2003)
Proc. of the Workshop on Requirements for High Assurance Systems (RHAS'03)
-
-
van Lamsweerde, A.1
Brohez, S.2
Landtsheer, R.D.3
Janssens, D.4
|