-
1
-
-
39449114401
-
-
P. Coffee, Security Onus Is on Developers, eWeek, 6 June 2006, www.eweek.com/article2/0,1895,1972593,00.asp.
-
P. Coffee, "Security Onus Is on Developers," eWeek, 6 June 2006, www.eweek.com/article2/0,1895,1972593,00.asp.
-
-
-
-
2
-
-
23944475544
-
When Security Meets Software Engineering: A Case of Modeling Secure Information Systems
-
H. Mouratidis, P. Giorgini, and G. Manson, "When Security Meets Software Engineering: A Case of Modeling Secure Information Systems," Information Systems, vol. 30, no. 8, 2005, pp. 609-629.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
3
-
-
33747302976
-
Web Application Security Engineering
-
J.D. Meier, "Web Application Security Engineering," IEEE Security & Privacy, vol. 4, no. 4, 2006, pp. 16-24.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 16-24
-
-
Meier, J.D.1
-
4
-
-
19944387279
-
Why Users Cannot Use Security
-
S. Furnell, "Why Users Cannot Use Security," Computers & Security vol. 24, no. 4, 2005, pp. 274-279.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 274-279
-
-
Furnell, S.1
-
6
-
-
33244470714
-
The Affordable Application of Formal Methods to Software Engineering
-
ACM Press
-
J.F. Davis, "The Affordable Application of Formal Methods to Software Engineering," ACM SIGAda Ada Letters, ACM Press, 2005, pp. 57-62.
-
(2005)
ACM SIGAda Ada Letters
, pp. 57-62
-
-
Davis, J.F.1
-
7
-
-
2942757657
-
Engineering Security Requirements
-
D.G. Firesmith, "Engineering Security Requirements," J. Object Technology, vol. 2, no. 1, 2003, pp. 53-68.
-
(2003)
J. Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.G.1
-
8
-
-
40449096402
-
Security Requirements Engineering: A Framework for Representation and Analysis
-
to be published in
-
C.B. Haley et al., "Security Requirements Engineering: A Framework for Representation and Analysis," to be published in IEEE Trans. Software Eng.; http://doi.ieeecomputersociety.org/10.1109/ TSE.2007.70754.
-
IEEE Trans. Software Eng
-
-
Haley, C.B.1
-
9
-
-
39449130657
-
Collaboration in a Secure Development Process Part 1
-
June
-
G. Peterson, "Collaboration in a Secure Development Process Part 1," Information Security Bull., June 2004, pp. 165-172.
-
(2004)
Information Security Bull
, pp. 165-172
-
-
Peterson, G.1
-
10
-
-
33750131444
-
-
tech. report CMU/ SEI-2005-TR-009, Software Eng. Inst, Carnegie Mellon Univ
-
N.R. Mead, E.D. Houg, and T.R. Stehney, Security Quality Requirements Engineering (SQUARE) Methodology, tech. report CMU/ SEI-2005-TR-009, Software Eng. Inst., Carnegie Mellon Univ., 2005.
-
(2005)
Security Quality Requirements Engineering (SQUARE) Methodology
-
-
Mead, N.R.1
Houg, E.D.2
Stehney, T.R.3
-
11
-
-
79960596773
-
Extending XP Practices to Support Security Requirements Engineering
-
SESS, ACM Press
-
G. Boström et al., "Extending XP Practices to Support Security Requirements Engineering," Proc. 2006 Int'l Worksbop Software Eng. for Secure Systems (SESS), ACM Press, 2006, pp. 11-18.
-
(2006)
Proc. 2006 Int'l Worksbop Software Eng. for Secure Systems
, pp. 11-18
-
-
Boström, G.1
-
12
-
-
27644580707
-
Demystifying the Threat Modeling Process
-
P. Torr, "Demystifying the Threat Modeling Process," IEEE Security & Privacy, vol. 3, no. 5, 2005, pp. 66-70.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
, pp. 66-70
-
-
Torr, P.1
-
14
-
-
24344438696
-
Secure Software Development by Example
-
A. Apvrille and M. Pourzandi, "Secure Software Development by Example," IEEE Security & Privacy, vol. 3, no. 4, 2005, pp. 10-17.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 10-17
-
-
Apvrille, A.1
Pourzandi, M.2
-
15
-
-
39449122413
-
A Methodology for Secure Software Design
-
paper presented at the
-
E.B. Fernandez, "A Methodology for Secure Software Design," paper presented at the Int'l Symp. Web Services and Applications (ISWS), 2004; www.cse.fau.edu/~ed/EFLVSecSysDes1.pdf.
-
(2004)
Int'l Symp. Web Services and Applications (ISWS)
-
-
Fernandez, E.B.1
-
16
-
-
27644524446
-
Bridging the Gap between Software Development and Information Security
-
K.R. van Wyk and G. McGraw, "Bridging the Gap between Software Development and Information Security," IEEE Security & Privacy, vol. 3, no. 5, 2005, pp. 75-79.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
, pp. 75-79
-
-
van Wyk, K.R.1
McGraw, G.2
-
17
-
-
19644380905
-
Problem Frame Semantics for Software Development
-
J.G. Hall, L. Rapanotti, and M. Jackson, "Problem Frame Semantics for Software Development," Software and Systems Modeling, vol. 4, no. 2, 2005, pp. 189-198.
-
(2005)
Software and Systems Modeling
, vol.4
, Issue.2
, pp. 189-198
-
-
Hall, J.G.1
Rapanotti, L.2
Jackson, M.3
-
19
-
-
33845197906
-
Information Modeling for Automated Risk Analysis
-
Proc. Comm. and Multimedia Security, Springer
-
H. Chivers, "Information Modeling for Automated Risk Analysis," Proc. Comm. and Multimedia Security, LNCS 4237, Springer, 2006, pp. 228-239.
-
(2006)
LNCS
, vol.4237
, pp. 228-239
-
-
Chivers, H.1
-
20
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-models
-
IEEE CS Press
-
A. van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional Anti-models," Proc. 26th Int'l Conf. Software Eng. (ICSE 04), IEEE CS Press, 2004, pp. 148-157.
-
(2004)
Proc. 26th Int'l Conf. Software Eng. (ICSE 04)
, pp. 148-157
-
-
van Lamsweerde, A.1
-
21
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
G. Sindre and A.L. Opdahl, "Eliciting Security Requirements with Misuse Cases," Requirements Eng., vol. 10, no. 1, 2005, pp. 34-44.
-
(2005)
Requirements Eng
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
22
-
-
85045573601
-
Using Abuse Case Models for Security Requirements Analysis
-
IEEE CS Press
-
J. McDermott and C. Fox, "Using Abuse Case Models for Security Requirements Analysis," Proc. Computer Security Applications Conf. IEEE CS Press, 1999, pp. 55-64.
-
(1999)
Proc. Computer Security Applications Conf
, pp. 55-64
-
-
McDermott, J.1
Fox, C.2
-
23
-
-
2942713443
-
Security Use Cases
-
D.G. Firesmith, "Security Use Cases," J. Object Technology, vol. 2, no. 3, 2003, pp. 53-64.
-
(2003)
J. Object Technology
, vol.2
, Issue.3
, pp. 53-64
-
-
Firesmith, D.G.1
-
24
-
-
77954606675
-
Proc. 12th Working Conf. Requirements Eng.: Foundation for Software Quality
-
REFSQ, Essener Informatik Beiträge
-
L. Røstad, "An Extended Misuse Case Notation: Including Vulnerabilities and the Insider Threat," Proc. 12th Working Conf. Requirements Eng.: Foundation for Software Quality (REFSQ), Essener Informatik Beiträge, 2006, pp. 33-34.
-
(2006)
, pp. 33-34
-
-
Røstad, L.1
-
27
-
-
0002670359
-
Attack Trees - Modeling Security Threats
-
Dec
-
B. Schneier, "Attack Trees - Modeling Security Threats," Dr. Dobb's J., Dec. 1999, pp. 21-29.
-
(1999)
Dr. Dobb's J
, pp. 21-29
-
-
Schneier, B.1
-
29
-
-
0029191009
-
Dealing with Non-functional Requirements: Three Experimental Studies of a Process-Oriented Approach
-
IEEE CS Press
-
L. Chung and B.A. Nixon, "Dealing with Non-functional Requirements: Three Experimental Studies of a Process-Oriented Approach," Proc. 17th Int'l Conf. Software Eng. (ICSE 95), IEEE CS Press, 1995, pp. 25-37.
-
(1995)
Proc. 17th Int'l Conf. Software Eng. (ICSE 95)
, pp. 25-37
-
-
Chung, L.1
Nixon, B.A.2
-
30
-
-
84979855000
-
-
L. Chung, Dealing with Security Requirements during the Development of Information Systems, Proc. 5th Int'l Conf. Advanced Information Systems Eng. (CAiSE), LNCS 685, Springer, 1993, pp. 234-251.
-
L. Chung, "Dealing with Security Requirements during the Development of Information Systems," Proc. 5th Int'l Conf. Advanced Information Systems Eng. (CAiSE), LNCS 685, Springer, 1993, pp. 234-251.
-
-
-
-
31
-
-
39449122071
-
A Goal-Oriented Approach to Identifying and Mitigating Security Risks
-
IEEE CS Press
-
J. Cleland-Huang et al., "A Goal-Oriented Approach to Identifying and Mitigating Security Risks," Proc. Int'l Symp. Secure Software Eng. IEEE CS Press, 2006, pp. 167-177.
-
(2006)
Proc. Int'l Symp. Secure Software Eng
, pp. 167-177
-
-
Cleland-Huang, J.1
-
32
-
-
0010920417
-
From Object-Oriented to Goal-Oriented Requirements Analysis
-
J. Mylopoulos, L. Chung, and E. Yu, "From Object-Oriented to Goal-Oriented Requirements Analysis," Comm. ACM, vol. 42, no. 1, 1999, pp. 31-37.
-
(1999)
Comm. ACM
, vol.42
, Issue.1
, pp. 31-37
-
-
Mylopoulos, J.1
Chung, L.2
Yu, E.3
-
33
-
-
33747216149
-
Security Policies and the Software Developer
-
D. Verdon, "Security Policies and the Software Developer," IEEE Security & Privacy, vol. 4, no. 4, 2006, pp. 42-49.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 42-49
-
-
Verdon, D.1
|