-
2
-
-
0037240812
-
Misuse Cases: Use Cases with Hostile Intent
-
Jan/Feb
-
Alexander, I. "Misuse Cases: Use Cases with Hostile Intent." IEEE Software, 20(1), Jan/Feb 2003, pp: 58-66.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
3
-
-
0024031604
-
The TAME project: Towards improvement-oriented software environments
-
Basili V.R., Rombach H.D., "The TAME project: Towards improvement-oriented software environments," IEEE Transactions on Software Engineering, 14(6), 1988, pp: 758-773.
-
(1988)
IEEE Transactions on Software Engineering
, vol.14
, Issue.6
, pp. 758-773
-
-
Basili, V.R.1
Rombach, H.D.2
-
4
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R., "Information systems security design methods: implications for information systems development," ACM Computing Surveys, 25(4), 1993, pp: 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
5
-
-
0030125127
-
On the Relative Expressiveness of Description Logics and Predicate Logics
-
AI, 821-2
-
Borgida, A. "On the Relative Expressiveness of Description Logics and Predicate Logics," AI, 82(1-2), 1996, pp: 353-367.
-
(1996)
, pp. 353-367
-
-
Borgida, A.1
-
8
-
-
47949117628
-
-
Common Criteria, v2.1. ISO/IEC 15408-1, 1999.
-
Common Criteria, v2.1. ISO/IEC 15408-1, 1999.
-
-
-
-
10
-
-
47949087899
-
-
DoD 8510.1-M: DITSCAP Application Manual. 2000.
-
DoD 8510.1-M: DITSCAP Application Manual. 2000.
-
-
-
-
11
-
-
47949093812
-
-
DoD Instruction 5200.40: DITSCAP, 1997.
-
DoD Instruction 5200.40: DITSCAP, 1997.
-
-
-
-
12
-
-
47949092277
-
-
DoDI 8500.2. IA Implementation. Feb 2003.
-
DoDI 8500.2. IA Implementation. Feb 2003.
-
-
-
-
13
-
-
31044434638
-
A practical framework for eliciting and modeling system dependability requirements
-
Donzelli, P. Basili, V., "A practical framework for eliciting and modeling system dependability requirements," Journal of Systems and Software, 79(1), 2006, pp:107-119.
-
(2006)
Journal of Systems and Software
, vol.79
, Issue.1
, pp. 107-119
-
-
Donzelli, P.1
Basili, V.2
-
14
-
-
0003078938
-
Contextual implications between attributes and some representational properties for finite lattices
-
B.I. Wissenschaftsverlag
-
Duquenne, V. "Contextual implications between attributes and some representational properties for finite lattices" Beitrage zur Begrisanalyse, B.I. Wissenschaftsverlag, 1987, pp: 213-239
-
(1987)
Beitrage zur Begrisanalyse
, pp. 213-239
-
-
Duquenne, V.1
-
15
-
-
84954120530
-
Domain modelling with hierarchies of alternative viewpoints
-
Easterbrook, S., "Domain modelling with hierarchies of alternative viewpoints", In Proc. Int'l Sym. on RE., 1993, pp: 65-72.
-
(1993)
Proc. Int'l Sym. on RE
, pp. 65-72
-
-
Easterbrook, S.1
-
16
-
-
47949105259
-
-
th annual Global Information Security Survey, Netherland, 2005.
-
th annual Global Information Security Survey, Netherland, 2005.
-
-
-
-
17
-
-
7744242790
-
Quantitative risk-based requirements reasoning
-
Feather, M. S., Cornford, S.L., "Quantitative risk-based requirements reasoning," RE Journal, Vol. 8(4), 2003, pp: 248-265.
-
(2003)
RE Journal
, vol.8
, Issue.4
, pp. 248-265
-
-
Feather, M.S.1
Cornford, S.L.2
-
20
-
-
0035418268
-
Defining and applying measures of distance between specifications
-
Jilani, L.L., et al., "Defining and applying measures of distance between specifications," IEEE TSE, 27(8), 2001, pp.673-703.
-
(2001)
IEEE TSE
, vol.27
, Issue.8
, pp. 673-703
-
-
Jilani, L.L.1
-
21
-
-
47949114956
-
-
Johansson E, Johnson P. Assessment of Enterprise Information Security - Estimating the Credibility of the Results, In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
-
Johansson E, Johnson P. "Assessment of Enterprise Information Security - Estimating the Credibility of the Results," In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
-
-
-
-
23
-
-
0029733929
-
Requirements engineering with viewpoints
-
Kotonya, G., Sommerville, I., "Requirements engineering with viewpoints," Software Engineering Journal, 11(1), 1996, pp: 5-18.
-
(1996)
Software Engineering Journal
, vol.11
, Issue.1
, pp. 5-18
-
-
Kotonya, G.1
Sommerville, I.2
-
24
-
-
47949102913
-
-
Lee, S.W., Gandhi, R.A. et al, Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems, In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
-
Lee, S.W., Gandhi, R.A. et al, "Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems", In Proc. Sym. on RE for Info. Security (SREIS 05) at RE 05, 2005.
-
-
-
-
25
-
-
47949083988
-
r-AnalytiCA: Requirements Analytics for Certification & Accreditation
-
To appear in, October 15-19, Delhi, India
-
th IEEE Int. RE Conf. (RE 07), Posters, Demos and Exhibits Session, October 15-19, Delhi, India, 2007.
-
(2007)
th IEEE Int. RE Conf. (RE 07), Posters, Demos and Exhibits Session
-
-
Lee, S.W.1
Gandhi, R.A.2
-
27
-
-
33845297655
-
Requirements as Enablers for Software Assurance
-
December
-
Lee, S.W., Gandhi, R.A., "Requirements as Enablers for Software Assurance," CrossTalk: The Journal of Defense Software Engineering, December Issue, 19(12), 2006, pp: 20-24.
-
(2006)
CrossTalk: The Journal of Defense Software Engineering
, vol.19
, Issue.12
, pp. 20-24
-
-
Lee, S.W.1
Gandhi, R.A.2
-
28
-
-
34247487097
-
Certification Process Artifacts Defined as Measurable Units for Software Assurance
-
Lee, S.W., Gandhi, R.A., Ahn, G.J., "Certification Process Artifacts Defined as Measurable Units for Software Assurance" Soft. Process: Improvement and Practice, Vol. 12(2), 2007, pp. 165-189.
-
(2007)
Soft. Process: Improvement and Practice
, vol.12
, Issue.2
, pp. 165-189
-
-
Lee, S.W.1
Gandhi, R.A.2
Ahn, G.J.3
-
29
-
-
33845292826
-
Building decision support problem domain ontology from natural language requirements for software assurance
-
Dec
-
Lee, S.W., Muthurajan, D., Gandhi, R.A., et al., "Building decision support problem domain ontology from natural language requirements for software assurance," Int'l Journal on Software Engg. and Knowledge Engg., 16(6), Dec. 2006, pp: 851-884.
-
(2006)
Int'l Journal on Software Engg. and Knowledge Engg
, vol.16
, Issue.6
, pp. 851-884
-
-
Lee, S.W.1
Muthurajan, D.2
Gandhi, R.A.3
-
30
-
-
24944496493
-
Missing Requirements and Relationship Discovery through Proxy Viewpoints Model
-
Lee, S.W., Rine, D.C. "Missing Requirements and Relationship Discovery through Proxy Viewpoints Model," Studia Informatica Universalis: Int'l Journal on Informatics, 3(3), 2004 pp. 315-342.
-
(2004)
Studia Informatica Universalis: Int'l Journal on Informatics
, vol.3
, Issue.3
, pp. 315-342
-
-
Lee, S.W.1
Rine, D.C.2
-
34
-
-
47949125459
-
-
Mead, N. R., Hough, E., Stehney, T., Security Quality Requirements Engineering (SQUARE) Methodology, Technical Report (CMU/SEI-2005-TR-009), SEI, CMU, Pittsburgh, PA 2005
-
Mead, N. R., Hough, E., Stehney, T., "Security Quality Requirements Engineering (SQUARE) Methodology," Technical Report (CMU/SEI-2005-TR-009), SEI, CMU, Pittsburgh, PA 2005
-
-
-
-
35
-
-
47949119764
-
-
Moffett, J.D., Haley, C.B., Nuseibeh, B.A, Core Security Requirements Artefacts, TR 2004/23, Open University, June 2004.
-
Moffett, J.D., Haley, C.B., Nuseibeh, B.A, "Core Security Requirements Artefacts," TR 2004/23, Open University, June 2004.
-
-
-
-
36
-
-
47949128365
-
-
OCTAVE™ Criteria v2.0, CMU/SEI-2001-TR-016, 2001.
-
OCTAVE™ Criteria v2.0, CMU/SEI-2001-TR-016, 2001.
-
-
-
-
37
-
-
4444245089
-
The Common Criteria Evaluation Process
-
James Madison Univ
-
Prieto-Diaz, R., "The Common Criteria Evaluation Process," CISC-TR-2002-003, James Madison Univ., 2002.
-
(2002)
CISC-TR-2002-003
-
-
Prieto-Diaz, R.1
-
41
-
-
0034497420
-
-
Sindre, G., Opdahl, A., Eliciting Security Requirements by Misuse Cases, In Proc. of TOOLS Pacific, 2000, pp: 120-130.
-
Sindre, G., Opdahl, A., "Eliciting Security Requirements by Misuse Cases," In Proc. of TOOLS Pacific, 2000, pp: 120-130.
-
-
-
-
44
-
-
47949123914
-
Agencies Need to Implement Consistent Processes in Authorizing Systems for Operation,
-
04-376, 2004
-
US GAO Report, "Agencies Need to Implement Consistent Processes in Authorizing Systems for Operation," 04-376, 2004.
-
US GAO Report
-
-
-
45
-
-
47949133307
-
-
Department of Homeland Security Needs to Fully Implement its Security Program, 05-700
-
US GAO Report, "Department of Homeland Security Needs to Fully Implement its Security Program," 05-700, 2005.
-
(2005)
US GAO Report
-
-
-
46
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-Models
-
van Lamsweerde, A., "Elaborating Security Requirements by Construction of Intentional Anti-Models," In Proc. 26th Int'l Conf. on Software Engg., 2004, pp: 148-157.
-
(2004)
Proc. 26th Int'l Conf. on Software Engg
, pp. 148-157
-
-
van Lamsweerde, A.1
-
47
-
-
4344569744
-
Risk Analysis in Software Design
-
Verdon, D., McGraw, G., "Risk Analysis in Software Design." IEEE Security & Privacy Magazine, 2(4), 2004, pp: 79-84
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.4
, pp. 79-84
-
-
Verdon, D.1
McGraw, G.2
-
48
-
-
0032639499
-
Certifying software for high-assurance environments
-
Jul/Aug
-
Voas, J., "Certifying software for high-assurance environments," IEEE Software, 16(4), Jul/Aug 1999, pp: 48-54.
-
(1999)
IEEE Software
, vol.16
, Issue.4
, pp. 48-54
-
-
Voas, J.1
-
49
-
-
34748829296
-
A Case Study in Systematic Improvement of Language for Requirements
-
th Int'l RE Conf., 2006, pp: 6-15.
-
(2006)
th Int'l RE Conf
, pp. 6-15
-
-
Wasson, K.S.1
-
50
-
-
84860994379
-
Conceptual Graphs and Formal Concept Analysis
-
Wille, R., "Conceptual Graphs and Formal Concept Analysis," Int'l Conf. on Conceptual Structures, 1997, pp: 290-303.
-
(1997)
Int'l Conf. on Conceptual Structures
, pp. 290-303
-
-
Wille, R.1
-
51
-
-
47949084729
-
Risk Modelling and Reasoning in Goal Models
-
Univ. of Trento
-
Yudistira, A., Giorgini, P., Mylopoulos, J., "Risk Modelling and Reasoning in Goal Models," DIT-06-008, Univ. of Trento, 2006.
-
(2006)
DIT-06-008
-
-
Yudistira, A.1
Giorgini, P.2
Mylopoulos, J.3
|