-
2
-
-
34548155491
-
Eliciting confidentiality requirements in practice
-
IBM Press
-
S. Gürses, J. H. Jahnke, C. Obry, A. Onabajo, T. Santen, and M. Price. Eliciting confidentiality requirements in practice. In CASCON '05: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pages 101-116. IBM Press, 2005.
-
(2005)
CASCON '05: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
, pp. 101-116
-
-
Gürses, S.1
Jahnke, J.H.2
Obry, C.3
Onabajo, A.4
Santen, T.5
Price, M.6
-
3
-
-
70350130621
-
A framework for security requirements engineering
-
New York, NY, USA, ACM Press
-
C. B. Haley, J. D. Moffett, R. Laney, and B. Nuseibeh. A framework for security requirements engineering. In SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems, pages 35-42, New York, NY, USA, 2006. ACM Press.
-
(2006)
SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems
, pp. 35-42
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
4
-
-
33746660228
-
Security engineering using problem frames
-
G. Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Communication Security ETRICS, Springer-Verlag
-
D. Hatebur, M. Heisel, and H. Schmidt. Security engineering using problem frames. In G. Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS), LNCS 3995, pages 238-253. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.3995
, pp. 238-253
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
5
-
-
34548181856
-
-
D. Hatebur, M. Heisel, and H. Schmidt. A pattern system for security requirements engineering. In Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pages 356-365. IEEE, 2007.
-
D. Hatebur, M. Heisel, and H. Schmidt. A pattern system for security requirements engineering. In Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pages 356-365. IEEE, 2007.
-
-
-
-
7
-
-
0029191909
-
Deriving specifications from requirements: An example
-
Seattle, USA, ACM Press
-
M. Jackson and P. Zave. Deriving specifications from requirements: an example. In Proceedings 17th Int. Conf. on Software Engineering, Seattle, USA, pages 15-24. ACM Press, 1995.
-
(1995)
Proceedings 17th Int. Conf. on Software Engineering
, pp. 15-24
-
-
Jackson, M.1
Zave, P.2
-
8
-
-
17044394774
-
Using abuse frames to bound the scope of security problems
-
L. Lin, B. Nuseibeh, D. Ince, and M. Jackson. Using abuse frames to bound the scope of security problems. In Proceedings of 11th IEEE International Requirements Engineering-Conference (RE'04), pages 354-355, 2004.
-
(2004)
Proceedings of 11th IEEE International Requirements Engineering-Conference (RE'04)
, pp. 354-355
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
-
9
-
-
84944683046
-
Security-critical system development with extended use cases
-
G. Popp, J. Jürjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In APSEC, pages 478-487, 2003.
-
(2003)
APSEC
, pp. 478-487
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
10
-
-
84947731536
-
Preserving software quality characteristics from requirements analysis to architectural design
-
Springer Berlin, Heidelberg
-
H. Schmidt and I. Wentzlaff. Preserving software quality characteristics from requirements analysis to architectural design. In Proceedings of the European Workshop on Software Architectures (EWSA), volume 4344/2006, pages 189-203. Springer Berlin / Heidelberg, 2006.
-
(2006)
Proceedings of the European Workshop on Software Architectures (EWSA)
, vol.4344
, pp. 189-203
-
-
Schmidt, H.1
Wentzlaff, I.2
-
11
-
-
33750050331
-
-
Wiley & Sons
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. Wiley & Sons, 2005.
-
(2005)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
|