-
1
-
-
2942750151
-
Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements
-
Firesmith, D.G.: Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements. Journal of Object Technology 3, 27-42 (2004)
-
(2004)
Journal of Object Technology
, vol.3
, pp. 27-42
-
-
Firesmith, D.G.1
-
2
-
-
38349021844
-
Using Abuse Case Models for Security Requirements Analysis
-
Dignum, F.P.M, Greaves, M, eds, Issues in Agent Communication, Springer, Heidelberg
-
McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Dignum, F.P.M., Greaves, M. (eds.) Issues in Agent Communication. LNCS, vol. 1916, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1916
-
-
McDermott, J.1
Fox, C.2
-
3
-
-
84963992451
-
Software Engineering for Safety: A Roadmap
-
Finkelstein, A, ed, ACM Press, New York
-
Lutz, R.R.: Software Engineering for Safety: A Roadmap. In: Finkelstein, A. (ed.) The Future of Software Engineering, pp. 213-226. ACM Press, New York (2000)
-
(2000)
The Future of Software Engineering
, pp. 213-226
-
-
Lutz, R.R.1
-
4
-
-
0003504769
-
-
Addison-Wesley, Boston
-
Jacobson, I., Christerson, M., Jonsson, P., Overgaard, G.: Object-Oriented Software Engineering: A Use Case Driven Approach. Addison-Wesley, Boston (1992)
-
(1992)
Object-Oriented Software Engineering: A Use Case Driven Approach
-
-
Jacobson, I.1
Christerson, M.2
Jonsson, P.3
Overgaard, G.4
-
5
-
-
33845227913
-
-
Poels, G., Burton-Jones, A., Gemino, A., Parsons, J., Ramesh, V.: Experimental Research on Conceptual Modeling: What Should We Be Doing and Why? In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, 4215, pp. 544-547. Springer, Heidelberg (2006)
-
Poels, G., Burton-Jones, A., Gemino, A., Parsons, J., Ramesh, V.: Experimental Research on Conceptual Modeling: What Should We Be Doing and Why? In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, vol. 4215, pp. 544-547. Springer, Heidelberg (2006)
-
-
-
-
6
-
-
0034833312
-
Deriving Safety Requirements Using Scenarios
-
Nuseibeh, B, Easterbrook, S, eds, Toronto, Canada, pp, IEEE Computer Society Press, Los Alamitos
-
Allenby, K., Kelly, T.: Deriving Safety Requirements Using Scenarios. In: Nuseibeh, B., Easterbrook, S. (eds.) Fifth IEEE International Symposium on Requirements Engineering (RE'01), Toronto, Canada, pp. 228-235. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Fifth IEEE International Symposium on Requirements Engineering (RE'01)
, pp. 228-235
-
-
Allenby, K.1
Kelly, T.2
-
7
-
-
38349060225
-
-
Guidelines, S.A.E.: Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment. Society of Automotive Engineers (1996)
-
Guidelines, S.A.E.: Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment. Society of Automotive Engineers (1996)
-
-
-
-
8
-
-
0003894709
-
-
Wiley, Chichester, UK
-
Redmill, F., Chudleigh, M., Catmur, J.: System Safety: HAZOP and Software HAZOP. Wiley, Chichester, UK (1999)
-
(1999)
System Safety: HAZOP and Software HAZOP
-
-
Redmill, F.1
Chudleigh, M.2
Catmur, J.3
-
9
-
-
24944590511
-
Automatic Translation from Requirements Model into Use Cases Modeling on UML
-
Gervasi, O, Gavrilova, M, Kumar, V, Laganà, A, Lee, H.P, Mun, Y, Taniar, D, Tan, C.J.K, eds, ICCSA 2005, Springer, Heidelberg
-
Kim, H.-K., Chung, Y.-K.: Automatic Translation from Requirements Model into Use Cases Modeling on UML. In: Gervasi, O., Gavrilova, M., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3482, pp. 769-777. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3482
, pp. 769-777
-
-
Kim, H.-K.1
Chung, Y.-K.2
-
11
-
-
23944450104
-
-
Pettit IV, R.G., Street, J.A.: Lessons Learned Applying UML in the Design of Mission-Critical Software. In: Nunes, N.J., Selic, B., Rodrigues da Silva, A., Toval Alvarez, A. (eds.) UML Modeling Languages and Applications. LNCS, 3297, pp. 129-137. Springer, Heidelberg (2005)
-
Pettit IV, R.G., Street, J.A.: Lessons Learned Applying UML in the Design of Mission-Critical Software. In: Nunes, N.J., Selic, B., Rodrigues da Silva, A., Toval Alvarez, A. (eds.) UML Modeling Languages and Applications. LNCS, vol.3297, pp. 129-137. Springer, Heidelberg (2005)
-
-
-
-
12
-
-
41149147242
-
Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance
-
Glinz, M, ed, St.Louis, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Ebnenasir, A., Cheng, B.H.C., Konrad, S.: Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance. In: Glinz, M. (ed.) 14th IEEE International Requirements Engineering Conference (RE'06), St.Louis, USA, pp. 343-344. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
14th IEEE International Requirements Engineering Conference (RE'06)
, pp. 343-344
-
-
Ebnenasir, A.1
Cheng, B.H.C.2
Konrad, S.3
-
13
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10, 34-44 (2005)
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
14
-
-
84948950071
-
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
-
Pohl, K, ed, Essen, Germany, pp, IEEE Computer Society Press, Los Alamitos
-
Alexander, I.F.: Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. In: Pohl, K. (ed.) 10th Anniversary IEEE Joint International Requirements Engineering Conference (RE'02), Essen, Germany, pp. 9-13. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
10th Anniversary IEEE Joint International Requirements Engineering Conference (RE'02)
, pp. 9-13
-
-
Alexander, I.F.1
-
15
-
-
0037240812
-
Misuse Cases, Use Cases with Hostile Intent
-
Alexander, I.F.: Misuse Cases, Use Cases with Hostile Intent. IEEE Software 20, 58-66 (2003)
-
(2003)
IEEE Software
, vol.20
, pp. 58-66
-
-
Alexander, I.F.1
-
16
-
-
35048845223
-
An Approach for Model-Based Risk Assessment
-
Heisel, M, Liggesmeyer, P, Wittmann, S, eds, SAFECOMP 2004, Springer, Heidelberg
-
Gran, B.A., Fredriksen, R., Thunem, A.P.-J.: An Approach for Model-Based Risk Assessment. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol. 3219, pp. 311-324. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3219
, pp. 311-324
-
-
Gran, B.A.1
Fredriksen, R.2
Thunem, A.P.-J.3
-
17
-
-
38349052444
-
-
Jürjens, J.: Developing Safety-Critical Systems with UML. In: Stevens, P., Whittle, J., Booch, G. (eds.) (UML 2003). LNCS, 2863, pp. 144-159. Springer, Heidelberg (2003)
-
Jürjens, J.: Developing Safety-Critical Systems with UML. In: Stevens, P., Whittle, J., Booch, G. (eds.) (UML 2003). LNCS, vol. 2863, pp. 144-159. Springer, Heidelberg (2003)
-
-
-
-
18
-
-
33750980649
-
UML-basierte Entwicklung sikkerheitskritische Systemen im Bahnbereich
-
Tech Univ Braunschweig
-
Hungar, H.: UML-basierte Entwicklung sikkerheitskritische Systemen im Bahnbereich. Dagstuhl Workshop on Model-Based Development of Embedded Systems, Dagstuhl, Germany (January, 9-13), pp. 63-64. Tech Univ Braunschweig (2006)
-
(2006)
Dagstuhl Workshop on Model-Based Development of Embedded Systems, Dagstuhl, Germany (January, 9-13)
, pp. 63-64
-
-
Hungar, H.1
-
19
-
-
38349038633
-
-
Berkenkötter, K., Hannemann, U., Peleska, J., HYBRIS,: HYBRIS - Efficient Specification and Analysis of Hybrid Systems - Part III: RCSD - A UML 2.0 Profile for the Railway Control System Domain (Draft Version). Univ. Bremen, Germany (2006)
-
Berkenkötter, K., Hannemann, U., Peleska, J., HYBRIS,: HYBRIS - Efficient Specification and Analysis of Hybrid Systems - Part III: RCSD - A UML 2.0 Profile for the Railway Control System Domain (Draft Version). Univ. Bremen, Germany (2006)
-
-
-
-
20
-
-
38349060223
-
-
Tenzer, J.: Exploration games for safety-critical system design with UML 2.0. In: Fernandez, E.B., et al. (eds.): 3rd International Workshop on Critical Systems Development with UML, CSDUML'04, Lisbon, Portugal, 12 Oct, Technical Report 10415. pp. 41-55. Technische Universität München, (2004)
-
Tenzer, J.: Exploration games for safety-critical system design with UML 2.0. In: Fernandez, E.B., et al. (eds.): 3rd International Workshop on Critical Systems Development with UML, CSDUML'04, Lisbon, Portugal, 12 Oct, Technical Report 10415. pp. 41-55. Technische Universität München, (2004)
-
-
-
-
21
-
-
38349067971
-
-
Stålhane, T., Pham, H.T.: Assessment and Analysis of Robustness for a Web-Based System. In: Isaias, P., et al. (eds.) IADIS International Conference on WWW/Internet, Murcia, Spain, 5-8 October, IADIS Press (2006)
-
Stålhane, T., Pham, H.T.: Assessment and Analysis of Robustness for a Web-Based System. In: Isaias, P., et al. (eds.) IADIS International Conference on WWW/Internet, Murcia, Spain, 5-8 October, IADIS Press (2006)
-
-
-
-
22
-
-
33646849419
-
Safety Methods in Software Process Improvement
-
Richardson, I, Abrahamsson, P, Messnarz, R, eds, Software Process Improvement, Springer, Heidelberg
-
Lauritzen, T., Stålhane, T.: Safety Methods in Software Process Improvement. In: Richardson, I., Abrahamsson, P., Messnarz, R. (eds.) Software Process Improvement. LNCS, vol. 3792, pp. 95-105. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3792
, pp. 95-105
-
-
Lauritzen, T.1
Stålhane, T.2
-
23
-
-
35048875222
-
-
Fernandez-Medina, E., Trujillo, J., Villaroel, R., Piattini, M.: Extending UML for Designing Secure Data Warehouses. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, 3288, Springer, Heidelberg (2004)
-
Fernandez-Medina, E., Trujillo, J., Villaroel, R., Piattini, M.: Extending UML for Designing Secure Data Warehouses. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, vol. 3288, Springer, Heidelberg (2004)
-
-
-
-
24
-
-
38349035015
-
-
Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes through a UML 2. In: Roddick, J.F., Benjamins, V.R., Si-Saïd Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R., Grandi, F., Han, H., Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.). ER 2006. LNCS, 4231, Springer, Heidelberg (2006)
-
Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes through a UML 2. In: Roddick, J.F., Benjamins, V.R., Si-Saïd Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R., Grandi, F., Han, H., Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.). ER 2006. LNCS, vol. 4231, Springer, Heidelberg (2006)
-
-
-
-
25
-
-
79955143136
-
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.). UML 2002. LNCS, 2460, pp. 426-441. Springer, Heidelberg (2002)
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.). UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
-
-
-
26
-
-
85086954040
-
-
Jürjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, 4309, pp. 322-331. Springer, Heidelberg (2006)
-
Jürjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, vol. 4309, pp. 322-331. Springer, Heidelberg (2006)
-
-
-
-
27
-
-
38149121542
-
Mal-activity diagrams to capture attacks on business processes
-
Sawyer, P, Paech, B, Heymans, P, eds, REFSQ 2007, Springer, Heidelberg
-
Sindre, G.: Mal-activity diagrams to capture attacks on business processes. In: Sawyer, P., Paech, B., Heymans, P. (eds.). REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4542
, pp. 355-366
-
-
Sindre, G.1
-
28
-
-
38349061876
-
Capturing Dependability Threats in Conceptual Modelling
-
Krogstie, J, et al, eds, Springer, Heidelberg
-
Sindre, G., Opdahl, A.L.: Capturing Dependability Threats in Conceptual Modelling. In: Krogstie, J., et al. (eds.) Conceptual Modelling in Information Systems Engineering, pp. 247-260. Springer, Heidelberg (2007)
-
(2007)
Conceptual Modelling in Information Systems Engineering
, pp. 247-260
-
-
Sindre, G.1
Opdahl, A.L.2
-
29
-
-
38349024697
-
-
Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. REFSQ'06, Luxembourg (2006)
-
Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. REFSQ'06, Luxembourg (2006)
-
-
-
-
30
-
-
38049047671
-
A look at misuse cases for safety concerns
-
Henderson-Sellers, B, et al, eds, IFIP WG8.1 Working Conference on Situational Method Engineering: Fundamentals and Experiences ME'07, Geneva, Switzerland, Springer, Heidelberg
-
Sindre, G.: A look at misuse cases for safety concerns. In: Henderson-Sellers, B., et al. (eds.) IFIP WG8.1 Working Conference on Situational Method Engineering: Fundamentals and Experiences (ME'07), Geneva, Switzerland. IFIP Series, Springer, Heidelberg (2007)
-
(2007)
IFIP Series
-
-
Sindre, G.1
-
32
-
-
84936823933
-
User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
-
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35, 982-1003 (1989)
-
(1989)
Management Science
, vol.35
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
33
-
-
38349025011
-
-
Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative's man burden by shunning badmandments. In: Jones, L.W. (ed.) The Collected Works of John W. Tukey, Wadsworth, Monterey, C.A. Tukey, Ill, pp. 187-389 (1986)
-
Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative's man burden by shunning badmandments. In: Jones, L.W. (ed.) The Collected Works of John W. Tukey, Wadsworth, Monterey, C.A. Tukey, vol. Ill, pp. 187-389 (1986)
-
-
-
-
34
-
-
0010404351
-
-
University of Queensland, Australia, Brisbane
-
Hopkins, W.G.: A New View of Statistics. University of Queensland, Australia, Brisbane (2001)
-
(2001)
A New View of Statistics
-
-
Hopkins, W.G.1
-
35
-
-
0003639957
-
-
Kluwer Academic, Norwell, MA, USA
-
Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B., Wesslén, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic, Norwell, MA, USA (2000)
-
(2000)
Experimentation in Software Engineering: An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Host, M.3
Ohlsson, M.C.4
Regnell, B.5
Wesslén, A.6
-
36
-
-
14844283058
-
Using Students as Experiment Subjects - An Analysis on Graduate and Freshmen Student Data
-
Linkman, S, ed, Keele University, Staffordshire, UK
-
Runeson, P.: Using Students as Experiment Subjects - An Analysis on Graduate and Freshmen Student Data. In: Linkman, S. (ed.) 7th International Conference on Empirical Assessment & Evaluation in Software Engineering (EASE'03), pp. 95-102. Keele University, Staffordshire, UK (2003)
-
(2003)
7th International Conference on Empirical Assessment & Evaluation in Software Engineering (EASE'03)
, pp. 95-102
-
-
Runeson, P.1
-
37
-
-
4344598248
-
Evaluating the Effect of a Delegated versus Centralized Control Style on the Maintainability of Object-oriented Software
-
Arisholm, E., Sjøberg, D.I.K.: Evaluating the Effect of a Delegated versus Centralized Control Style on the Maintainability of Object-oriented Software. IEEE Transactions on Software Engineering 30, 521-534 (2004)
-
(2004)
IEEE Transactions on Software Engineering
, vol.30
, pp. 521-534
-
-
Arisholm, E.1
Sjøberg, D.I.K.2
|