-
1
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
CA, 8-12 September, pp, IEEE Press, New York
-
Liu, L., Yu, E., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. 11th International Requirements Engineering Conference (RE'03), Monterey Bay, CA, 8-12 September, pp. 151-160. IEEE Press, New York (2003)
-
(2003)
11th International Requirements Engineering Conference (RE'03), Monterey Bay
, pp. 151-160
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
2
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10, 34-44 (2005)
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
3
-
-
17744386105
-
Froim System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering
-
Heytmeier, C, Mead, N, eds, September 8, pp, Monterey Bay, CA
-
van Lamsweerde, A., Brohez, S., De Landtsheer, R., Janssens, D.: Froim System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In: Heytmeier, C., Mead, N. (eds.) 2nd International Workshop on Requirements Engineering for High Assurance Systems (RHAS'03), Carnegie Mellon University, September 8, pp. 49-56. Monterey Bay, CA (2003)
-
(2003)
2nd International Workshop on Requirements Engineering for High Assurance Systems (RHAS'03), Carnegie Mellon University
, pp. 49-56
-
-
van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
-
4
-
-
34548557819
-
Arguing Security: Validating Security Requirements Using Structured Argumentation
-
Paris, France, August 29
-
Haley, C.B., Moffett, J., Laney, R., Nuseibeh, B.: Arguing Security: Validating Security Requirements Using Structured Argumentation. 3rd Symposium on Requirements Engineering for Information Security (SREIS 2005), Paris, France, (August 29, 2005)
-
(2005)
3rd Symposium on Requirements Engineering for Information Security (SREIS
-
-
Haley, C.B.1
Moffett, J.2
Laney, R.3
Nuseibeh, B.4
-
5
-
-
79955143136
-
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools. LNCS, 2460, pp. 426-441. Springer, Heidelberg (2002)
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
0034497420
-
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements by Misuse Cases. In: Henderson-Sellers, B., Meyer, B. (eds.) TOOLS Pacific 2000, Sydney, pp. 120-131. IEEE CS Press, Los Alamitos (2000)
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements by Misuse Cases. In: Henderson-Sellers, B., Meyer, B. (eds.) TOOLS Pacific 2000, Sydney, pp. 120-131. IEEE CS Press, Los Alamitos (2000)
-
-
-
-
10
-
-
17044394774
-
Using Abuse Frames to Bound the Scope of Security Problems
-
Maiden, N.A.M, ed, Kyoto, Japan, IEEE
-
Lin, L., Nuseibeh, B., Ince, D., Jackson, M.: Using Abuse Frames to Bound the Scope of Security Problems. In: Maiden, N.A.M. (ed.) 12th IEEE International Requirements Engineering Conference (RE'04), Kyoto, Japan, IEEE (2004)
-
(2004)
12th IEEE International Requirements Engineering Conference (RE'04)
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
-
11
-
-
38149086174
-
-
Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. REFSQ'06, Luxembourg (2006)
-
Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. REFSQ'06, Luxembourg (2006)
-
-
-
-
12
-
-
38149025646
-
-
Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes through a UML 2. In: Roddick, J.F., Benjamins, V.R., Si-Saïd Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R., Grandi, F., Han, H., Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.) ER 2006 Workshops. LNCS, 4231, pp. 6-9. Springer, Heidelberg (2006)
-
Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes through a UML 2. In: Roddick, J.F., Benjamins, V.R., Si-Saïd Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R., Grandi, F., Han, H., Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.) ER 2006 Workshops. LNCS, vol. 4231, pp. 6-9. Springer, Heidelberg (2006)
-
-
-
|