-
2
-
-
38949167705
-
Cautious Web Services Software Adoption Continues; IDC Expects Spending to Reach $11 Billion by 2008
-
IDC
-
IDC, "Cautious Web Services Software Adoption Continues; IDC Expects Spending to Reach $11 Billion by 2008," 2004.
-
(2004)
-
-
-
3
-
-
70449097155
-
Web Services Security: Is the problem solved?
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Web Services Security: is the problem solved?," Information Systems Security, vol. 13, pp. 22-31, 2004.
-
(2004)
Information Systems Security
, vol.13
, pp. 22-31
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
4
-
-
2942683823
-
-
1st ed
-
M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, and T. Newling, Patterns: Service-Oriented Architecture and Web Services, 1st ed, 2004.
-
(2004)
Patterns: Service-Oriented Architecture and Web Services
-
-
Endrei, M.1
Ang, J.2
Arsanjani, A.3
Chua, S.4
Comte, P.5
Krogdahl, P.6
Luo, M.7
Newling, T.8
-
5
-
-
2942683823
-
-
M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, and T. Newling, Patterns: Services Oriented Architectures and Web Services, 2004.
-
(2004)
Patterns: Services Oriented Architectures and Web Services
-
-
Endrei, M.1
Ang, J.2
Arsanjani, A.3
Chua, S.4
Comte, P.5
Krogdahl, P.6
Luo, M.7
Newling, T.8
-
6
-
-
20444440807
-
Sound Development of Secure Service-based Systems
-
presented at, New York, USA
-
M. Deubler, J. Grünbauer, J. Jürjens, and G. Wimmel, "Sound Development of Secure Service-based Systems," presented at ICSOC04, New York, USA, 2004.
-
(2004)
ICSOC04
-
-
Deubler, M.1
Grünbauer, J.2
Jürjens, J.3
Wimmel, G.4
-
7
-
-
18944368586
-
Towards a Model-Based and Incremental Development Process for Service-Based Systems
-
presented at , Innsbruck, Austria
-
M. Deubler, J. Grünbauer, G. Popp, G. Wimmel, and C. Salzmann, "Towards a Model-Based and Incremental Development Process for Service-Based Systems," presented at International Conference on Software Engineering (IASTED SE 2004), Innsbruck, Austria, 2004.
-
(2004)
International Conference on Software Engineering (IASTED SE
-
-
Deubler, M.1
Grünbauer, J.2
Popp, G.3
Wimmel, G.4
Salzmann, C.5
-
9
-
-
33644682771
-
-
SEI, Technical Note CMU/SEI-2003-TN-033, December
-
D. G. Smith, "Common Concepts Underlying Safety, Security, and Survivability Engineering," SEI, Technical Note CMU/SEI-2003-TN-033, December 2003 2003.
-
(2003)
Common Concepts Underlying Safety, Security, and Survivability Engineering
-
-
Smith, D.G.1
-
10
-
-
0004277827
-
-
Carnegie Mellon. Software Engineering Institute. CMU/SEI-99-TR-007, April April
-
L. Bass and R. Kazman, "Architecture Based Development," Carnegie Mellon. Software Engineering Institute. CMU/SEI-99-TR-007, April 1999 April 1999.
-
(1999)
Architecture Based Development
, pp. 1999
-
-
Bass, L.1
Kazman, R.2
-
12
-
-
38949144682
-
Integrating Security Administration into Software Architecture Design
-
presented at, Banff, Canada
-
H. Yu, X. He, Y. Deng, and L. Mo, "Integrating Security Administration into Software Architecture Design," presented at International Conference on Software Engineering and Knowledge Engineering 2004, Banff, Canada, 2004.
-
(2004)
International Conference on Software Engineering and Knowledge Engineering
-
-
Yu, H.1
He, X.2
Deng, Y.3
Mo, L.4
-
14
-
-
0002670359
-
Attack Trees: Modeling Security Threats
-
B. Schneier, "Attack Trees: Modeling Security Threats," Dr. Dobb's Journal, 1999.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
16
-
-
38949090653
-
-
G. Sindre and A. L. Opdahl, Eliciting Security Requirements with Misuse Cases, presented at TOOLS-37'00, Sydney, Australia, 2000.
-
G. Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases," presented at TOOLS-37'00, Sydney, Australia, 2000.
-
-
-
-
17
-
-
0037240812
-
-
I. Alexander, Misuse Cases: Use Cases with Hostile Intent, IEEE Computer Software, 20, pp. 58-66, 2003
-
I. Alexander, "Misuse Cases: Use Cases with Hostile Intent," IEEE Computer Software, vol. 20, pp. 58-66, 2003.
-
-
-
-
21
-
-
17844409254
-
Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach
-
A. Toval, J. Nicolás, B. Moros, and F. García, "Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach," Requirements Engineering Journal, vol. 6, pp. 205-219, 2001.
-
(2001)
Requirements Engineering Journal
, vol.6
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
-
22
-
-
38949109580
-
-
I. C. Society, Software Engineering Body of Knowledge, 2004.
-
I. C. Society, "Software Engineering Body of Knowledge," 2004.
-
-
-
-
23
-
-
0029408391
-
The 4+1 View Model of Software Architecture
-
P. Krutchen, "The 4+1 View Model of Software Architecture," IEEE Software, pp. 42-50, 1995.
-
(1995)
IEEE Software
, pp. 42-50
-
-
Krutchen, P.1
-
24
-
-
0004025223
-
-
2nd, ed: Addison-Wesley
-
L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 2nd, ed: Addison-Wesley, 2003.
-
(2003)
Software Architecture in Practice
-
-
Bass, L.1
Clements, P.2
Kazman, R.3
-
25
-
-
1142301944
-
Model-Driven Trust Negotiation for Web Services
-
H. Skogsrud, B. Benatallah, and F. Casati, "Model-Driven Trust Negotiation for Web Services," IEEE Internet Computing, pp. 45- 51, 2003.
-
(2003)
IEEE Internet Computing
, pp. 45-51
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
26
-
-
35048901438
-
-
E. Ferrari and B. Thuraisingham, Security and Privacy for Web Databases and Services, E. 2004 and L. 2992, Eds. Berlin Heidelberg 2004: Springer-Verlag, 2004, pp. 17-28.
-
E. Ferrari and B. Thuraisingham, "Security and Privacy for Web Databases and Services," E. 2004 and L. 2992, Eds. Berlin Heidelberg 2004: Springer-Verlag, 2004, pp. 17-28.
-
-
-
-
27
-
-
38949200576
-
-
C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson, OCTAVE Framework, Version 1.0, Carnegie Mellon. SEI. CMU/SEI-99-TR-017, September 1999 1999
-
C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson, "OCTAVE Framework, Version 1.0," Carnegie Mellon. SEI. CMU/SEI-99-TR-017, September 1999 1999.
-
-
-
-
28
-
-
2942757657
-
Engineering Security Requirements
-
D. G. Firesmith, "Engineering Security Requirements," Journal of Object Technology, vol. 2, pp. 53-68, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, pp. 53-68
-
-
Firesmith, D.G.1
-
29
-
-
33646204176
-
-
SEI, Technical Note CMU/SEI-2004-TN-022, September
-
L. Bass, F. Bachmann, R. J. Ellison, A. P. Moore, and M. Klein, "Security and Survivability Reasoning Frameworks and Architectural Design Tactics," SEI, Technical Note CMU/SEI-2004-TN-022, September 2004 2004.
-
(2004)
Security and Survivability Reasoning Frameworks and Architectural Design Tactics
-
-
Bass, L.1
Bachmann, F.2
Ellison, R.J.3
Moore, A.P.4
Klein, M.5
-
30
-
-
38949173485
-
-
M. R. Barbacci, R. Ellison, A. J. Lattanze, J. A. Stafford, C. B. Weinstock, and W. G. Wood, Quality Attribute Workshops (QWAs). Third Edition., Carnegie Mellon. Software Engineering Institute. CMU/SEI2003-TR-016, August 2003 2003.
-
M. R. Barbacci, R. Ellison, A. J. Lattanze, J. A. Stafford, C. B. Weinstock, and W. G. Wood, "Quality Attribute Workshops (QWAs). Third Edition.," Carnegie Mellon. Software Engineering Institute. CMU/SEI2003-TR-016, August 2003 2003.
-
-
-
-
31
-
-
38949142589
-
-
TOGAF The Open Group Architecture Framework, Versión 8.1. Enterprise Edition, The Open Group 2003
-
"TOGAF (The Open Group Architecture Framework). Versión 8.1. "Enterprise Edition"," The Open Group 2003.
-
-
-
-
32
-
-
84942866002
-
Security and Privacy Requirements Analysis within Social Setting
-
presented at, Monterey Bay, CA, USA
-
L. Liu, E. Yu, and J. Mylopoulus, "Security and Privacy Requirements Analysis within Social Setting," presented at 11th IEEE International Requirements Engineering Conference, Monterey Bay, CA, USA, 2003.
-
(2003)
11th IEEE International Requirements Engineering Conference
-
-
Liu, L.1
Yu, E.2
Mylopoulus, J.3
-
33
-
-
2942753973
-
Specifying Reusable Security Requirements
-
D. G. Firesmith, "Specifying Reusable Security Requirements," Journal of Object Technology, vol. 3, pp. 61-75, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, pp. 61-75
-
-
Firesmith, D.G.1
-
34
-
-
2942563935
-
A Process Framework for Characterising Security Properties of Component-Based Software Systems
-
presented at
-
K. M. Khan and J. Han, "A Process Framework for Characterising Security Properties of Component-Based Software Systems," presented at Australian Software Engineering Conference (ASWEC04), 2004.
-
(2004)
Australian Software Engineering Conference (ASWEC04)
-
-
Khan, K.M.1
Han, J.2
-
35
-
-
38949138048
-
-
G. Jonsdottir, L. Davis, and R. Gamble, Designing Secure Integration Architectures, presented at ICCBSS 2003, 2003.
-
G. Jonsdottir, L. Davis, and R. Gamble, "Designing Secure Integration Architectures," presented at ICCBSS 2003, 2003.
-
-
-
-
36
-
-
33644973176
-
Applying the Tropos Methodology for Analysing Web Services Requirements and Reasoning about Qualities of Services
-
M. Aiello and P. Giorgini, "Applying the Tropos Methodology for Analysing Web Services Requirements and Reasoning about Qualities of Services," UPGRADE, vol. 5, pp. 20-26, 2004.
-
(2004)
UPGRADE
, vol.5
, pp. 20-26
-
-
Aiello, M.1
Giorgini, P.2
-
37
-
-
38949154073
-
Specification and Querying of Security Constraints in the EFSOC Framework
-
presented at, New York City, USA, Willem-Jan van den Heuvel
-
K. Leune and M. Papazaglou, "Specification and Querying of Security Constraints in the EFSOC Framework," presented at International Conference on Service Oriented Computing, New York City, USA, Willem-Jan van den Heuvel.
-
International Conference on Service Oriented Computing
-
-
Leune, K.1
Papazaglou, M.2
|