-
1
-
-
0027574423
-
Goal-Directed Requirements Acquisition
-
Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-Directed Requirements Acquisition. The Science of Computer Programming 20, 3-50 (1993)
-
(1993)
The Science of Computer Programming
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
van Lamsweerde, A.2
Fickas, S.3
-
2
-
-
84931838020
-
-
Castro, J., Kolp, M., Mylopoulos, J.: A requirements-driven development methodology, In Proc. of the 13th Int. Conf. on Advanced Information Systems Engineering, CAiSE'Ol. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) CAiSE 2001. LNCS, 2068, pp. 108-123. Springer, Heidelberg (2001)
-
Castro, J., Kolp, M., Mylopoulos, J.: A requirements-driven development methodology, In Proc. of the 13th Int. Conf. on Advanced Information Systems Engineering, CAiSE'Ol. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) CAiSE 2001. LNCS, vol. 2068, pp. 108-123. Springer, Heidelberg (2001)
-
-
-
-
5
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
IEEE Computer Society Press, Los Alamitos
-
Liu, L., Yu, E., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: IEEE Joint Int. Conf. on Requirements Engineering, pp. 151-161. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Joint Int. Conf. on Requirements Engineering
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
6
-
-
27644537252
-
Modeling Security Requirements through Ownership, Permission and Delegation
-
IEEE Computer Society Press, Los Alamitos
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling Security Requirements through Ownership, Permission and Delegation. In: 13th IEEE Int. Requirements Engineering Conf, pp. 167-176. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
13th IEEE Int. Requirements Engineering Conf
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
8
-
-
0030781944
-
Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering
-
Yu, E.: Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering. In: Proc. of the 3rd IEEE Int. Symp. on Requirements Engineering, pp. 226-235 (1997)
-
(1997)
Proc. of the 3rd IEEE Int. Symp. on Requirements Engineering
, pp. 226-235
-
-
Yu, E.1
-
9
-
-
0004069172
-
-
MIT/LCS/TR-604, Available at
-
Szolovits, P., Doyle, J., Long, W.J.: Guardian Angel: Patient-Centered Health Information Systems: MIT/LCS/TR-604, Available at: http://www.ga.org/ga
-
Guardian Angel: Patient-Centered Health Information Systems
-
-
Szolovits, P.1
Doyle, J.2
Long, W.J.3
-
10
-
-
0003696305
-
-
Kluwer Academic Publishing, Dordrecht
-
Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishing, Dordrecht (2000)
-
(2000)
Non-Functional Requirements in Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
11
-
-
0004025223
-
-
2nd edn. Addison Wesley, London, UK
-
Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 2nd edn. Addison Wesley, London, UK (2003)
-
(2003)
Software Architecture in Practice
-
-
Bass, L.1
Clements, P.2
Kazman, R.3
-
12
-
-
38349068106
-
-
Masters Thesis, University of Toronto, Department of Computer Science
-
Horkoff, J.: Using i* Models for Evaluation, Masters Thesis, University of Toronto, Department of Computer Science (2006)
-
(2006)
Using i* Models for Evaluation
-
-
Horkoff, J.1
-
14
-
-
85045573601
-
Using Abuse Case Models for Security Requirements Analysis
-
McDermott, J, Fox, C, eds, IEEE Computer Society Press, Los Alamitos
-
McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: McDermott, J., Fox, C. (eds.) Proc. 15th. IEEE Annual Computer Security Applications Conf., pp. 55-64. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
Proc. 15th. IEEE Annual Computer Security Applications Conf
, pp. 55-64
-
-
McDermott, J.1
Fox, C.2
-
16
-
-
35048870670
-
On Security Requirements Analysis for Multi-Agent Systems
-
Lucena, C, Garcia, A, Romanovsky, A, Castro, J, Alencar, P.S.C, eds, Software Engineering for Multi-Agent Systems II, Springer, Heidelberg
-
Bresciani, P., Giorgini, P., Mouratidis, H.: On Security Requirements Analysis for Multi-Agent Systems. In: Lucena, C., Garcia, A., Romanovsky, A., Castro, J., Alencar, P.S.C. (eds.) Software Engineering for Multi-Agent Systems II. LNCS, vol. 2940, pp. 35-48. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2940
, pp. 35-48
-
-
Bresciani, P.1
Giorgini, P.2
Mouratidis, H.3
-
17
-
-
1142293428
-
A Natural Extension of Tropos Methodology for Modelling Security
-
Mouratidis, H., Giorgini, P., Manso, G., Philp, I.: A Natural Extension of Tropos Methodology for Modelling Security. In: Proc. of the Workshop on Agent-oriented methodologies, at OOPSLA, pp. 91-103 (2002)
-
(2002)
Proc. of the Workshop on Agent-oriented methodologies, at OOPSLA
, pp. 91-103
-
-
Mouratidis, H.1
Giorgini, P.2
Manso, G.3
Philp, I.4
-
19
-
-
38349135028
-
Guide to Selecting Information Technology Security Products, Recommendations of the National Institute of Standards and Technology
-
Granee, T., Stevens, M., Myers, M.: Guide to Selecting Information Technology Security Products, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-836 (2003)
-
(2003)
NIST Special Publication
, vol.800-836
-
-
Granee, T.1
Stevens, M.2
Myers, M.3
-
20
-
-
70350130621
-
A framework for security requirements engineering
-
Haley, C.B., Moffett, J.D., Laney, R., Nuseibeh, B.: A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop (SESS'06), pp. 35-42 (2006)
-
(2006)
Software Engineering for Secure Systems Workshop (SESS'06)
, pp. 35-42
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
21
-
-
84899177670
-
An Integrated Security Verification and Security Solution Design Trade-off Analysis
-
IDEA Group Publishing, USA
-
Houmb, S.H., Georg, G., Jürjens, J., France, R.: An Integrated Security Verification and Security Solution Design Trade-off Analysis. In: Integrating Security and Software Engineering: Advances and Future Visions, pp. 190-219. IDEA Group Publishing, USA (2007)
-
(2007)
Integrating Security and Software Engineering: Advances and Future Visions
, pp. 190-219
-
-
Houmb, S.H.1
Georg, G.2
Jürjens, J.3
France, R.4
-
22
-
-
38349105814
-
Extended Influence Diagrams for Enterprise Architecture Analysis
-
IEEE Computer Society Press, Los Alamitos
-
Johnson, P., Lagerstrom, R., Norman, P., Simonsson, M.: Extended Influence Diagrams for Enterprise Architecture Analysis. In: Enterprise Distributed Object Computing Conference, EDOC '06. 10th IEEE Int., pp. 3-12. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Enterprise Distributed Object Computing Conference, EDOC '06. 10th IEEE Int
, pp. 3-12
-
-
Johnson, P.1
Lagerstrom, R.2
Norman, P.3
Simonsson, M.4
-
23
-
-
38349152964
-
Core Security Requirements Artefacts, Department of Computing, The Open University, Milton Keynes UK
-
Technical Report 2004/23
-
Moffett, J.D., Haley, C.B., Nuseibeh, B.: Core Security Requirements Artefacts, Department of Computing, The Open University, Milton Keynes UK, Technical Report 2004/23 (2004)
-
(2004)
-
-
Moffett, J.D.1
Haley, C.B.2
Nuseibeh, B.3
-
25
-
-
0037252218
-
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline, IEEE Internet Computing
-
Internet Computing
-
Sandhu, R.: Good-Enough Security: Toward a Pragmatic Business-Driven Discipline," IEEE Internet Computing, Vol. IEEE Internet Computing 07(1), 66-68 (2003)
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.1
, pp. 66-68
-
-
Sandhu, R.1
-
26
-
-
38349089223
-
-
US-CERT Vulnerability Notes Database, United States Computer Emergency Readiness Team, http://www.kb.cert.org/vuls
-
US-CERT Vulnerability Notes Database, United States Computer Emergency Readiness Team, http://www.kb.cert.org/vuls
-
-
-
-
28
-
-
38349158862
-
-
Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs, Technical Report, University of Toronto, Department of Computer Science, Available (2007), at http://istar.rwth-aachen.de/tike-index. php?page=Security+Requirements+Engineering
-
Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs, Technical Report, University of Toronto, Department of Computer Science, Available (2007), at http://istar.rwth-aachen.de/tike-index. php?page=Security+Requirements+Engineering
-
-
-
-
31
-
-
29844451321
-
-
Susi, A., Perini, A., Mylopoulos, J.: The Tropos Metamodel and its Use. Informatica 29, 401-408 (2005)
-
Susi, A., Perini, A., Mylopoulos, J.: The Tropos Metamodel and its Use. Informatica 29, 401-408 (2005)
-
-
-
|