-
2
-
-
45849122825
-
-
United States Senate and House of Representatives in Congress: Sarbanes-Oxley Act of 2002. Public Law 107-204 (116 Statute 745) (2002)
-
United States Senate and House of Representatives in Congress: Sarbanes-Oxley Act of 2002. Public Law 107-204 (116 Statute 745) (2002)
-
-
-
-
3
-
-
45849131284
-
Design of a Modelling Language for Information System Security Risk Management
-
Mayer, N., Heymans, P., Matulevičius, R.: Design of a Modelling Language for Information System Security Risk Management. In: Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS 2007), pp. 121-131 (2007)
-
(2007)
Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS
, pp. 121-131
-
-
Mayer, N.1
Heymans, P.2
Matulevičius, R.3
-
9
-
-
45849117958
-
Alignment of Misuse Cases with Security Risk Management
-
IEEE Computer Society, Los Alamitos
-
Matulevičius, R., Mayer, N., Heymans, P.: Alignment of Misuse Cases with Security Risk Management. In: Proceedings of the ARES 2008 Symposium on Requirements Engineering for Information Security (SREIS 2008), pp. 1397-1404. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the ARES 2008 Symposium on Requirements Engineering for Information Security (SREIS
, pp. 1397-1404
-
-
Matulevičius, R.1
Mayer, N.2
Heymans, P.3
-
11
-
-
17044394774
-
Using Abuse Frames to Bound the Scope of Security Problems
-
IEEE Computer Society, Los Alamitos
-
Lin, L., Nuseibeh, B., Ince, D., Jackson, M.: Using Abuse Frames to Bound the Scope of Security Problems. In: Proceedings of the 12th IEEE international Conference on Requirements Engineering (RE 2004), pp. 354-355. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
Proceedings of the 12th IEEE international Conference on Requirements Engineering (RE
, pp. 354-355
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
-
13
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering Journal 10(1), 34-44 (2005)
-
(2005)
Requirements Engineering Journal
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
14
-
-
38149121542
-
Mal-activity Diagrams for Capturing Attacks on Business Processes
-
Sawyer, P, Paech, B, Heymans, P, eds, REFSQ 2007, Springer, Heidelberg
-
Sindre, G.: Mal-activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Paech, B., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 355-366. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4542
, pp. 355-366
-
-
Sindre, G.1
-
15
-
-
79955143136
-
-
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based Modeling Language for Model-driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 426-441. Springer, Heidelberg (2002)
-
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based Modeling Language for Model-driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
-
-
-
16
-
-
79955163100
-
-
Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 412-425. Springer, Heidelberg (2002)
-
Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
-
-
-
-
17
-
-
45849106846
-
-
Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, 4801, pp. 87-101. Springer, Heidelberg (2007)
-
Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 87-101. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-models
-
IEEE Computer Society, Los Alamitos
-
van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-models. In: Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), pp. 148-157. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
Proceedings of the 26th International Conference on Software Engineering (ICSE
, pp. 148-157
-
-
van Lamsweerde, A.1
-
19
-
-
27644537252
-
Modeling Security Requirements Through Ownership, Permision and Delegation
-
IEEE Computer Society, Los Alamitos
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling Security Requirements Through Ownership, Permision and Delegation. In: Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005). IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
20
-
-
24944578244
-
Modelling social and individual trust in requirements engineering methodologies
-
Proceedings of the 3nd International Conference on Trust Management, Springer, Heidelberg
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modelling social and individual trust in requirements engineering methodologies. In: Proceedings of the 3nd International Conference on Trust Management. LNCS, pp. 161-176. Springer, Heidelberg (2005)
-
(2005)
LNCS
, pp. 161-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
21
-
-
33746038490
-
-
Mouratidis, H., Jurjens, J., Fox, J.: Towards a Comprehensive Framework for Secure Systems Development. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, 4001, pp. 48-62. Springer, Heidelberg (2006)
-
Mouratidis, H., Jurjens, J., Fox, J.: Towards a Comprehensive Framework for Secure Systems Development. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, pp. 48-62. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
3142750497
-
TROPOS: An Agent-oriented Software Development Methodology
-
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: an Agent-oriented Software Development Methodology. Journal of Autonomous Agents and Multi-Agent Systems 8, 203-236 (2004)
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
23
-
-
0036721855
-
Towards Requirements-Driven Information Systems Engineering: The TROPOS Project
-
Castro, J., Kolp, M., Mylopoulos, J.: Towards Requirements-Driven Information Systems Engineering: The TROPOS Project. Information Systems 27, 365-389 (2002)
-
(2002)
Information Systems
, vol.27
, pp. 365-389
-
-
Castro, J.1
Kolp, M.2
Mylopoulos, J.3
-
24
-
-
23944475544
-
When Security Meets Software Engineering: A Case of Modelling Secure Information Systems
-
Mouratidis, H., Giorgini, P., Manson, G.A.: When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Information Systems 30(8), 609-629 (2005)
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
25
-
-
35048845022
-
-
Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, 2681, pp. 63-78. Springer, Heidelberg (2003)
-
Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63-78. Springer, Heidelberg (2003)
-
-
-
-
27
-
-
84990316932
-
A Novel Agent-Based System to Support the Single Assessment Process of Older People
-
Mouratidis, H., Philp, I., Manson, G.: A Novel Agent-Based System to Support the Single Assessment Process of Older People. Journal of Health Informatics 9(3), 149-162 (2003)
-
(2003)
Journal of Health Informatics
, vol.9
, Issue.3
, pp. 149-162
-
-
Mouratidis, H.1
Philp, I.2
Manson, G.3
-
29
-
-
0034291619
-
Handling Obstacles in Goal-oriented Requirements Engineering
-
van Lamsweerde, A., Letier, E.: Handling Obstacles in Goal-oriented Requirements Engineering. Transactions on Software Engineering 26(10), 978-1005 (2000)
-
(2000)
Transactions on Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
|