-
1
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
Kluwer Academic Publishers May
-
P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, and A. Perini. Tropos: An agent-oriented software development methodology. Journal of Autonomous Agents and Multi-Agent Systems, Kluwer Academic Publishers Volume 8, Issue 3:203-236, May 2004.
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
2
-
-
49049118589
-
-
E. B. Fernandez, D. L. la Red M., J. Forneron, V. E. Uribe, and G. Rodriguez. A secure analysis pattern for handling legal cases. to be published in: SugarLoafPLoP'2007-6th Latin America Conference on Pattern Languages of Programming, http://sugarloafplop.dsc.upe.br/wwD.zip, 2007.
-
E. B. Fernandez, D. L. la Red M., J. Forneron, V. E. Uribe, and G. Rodriguez. A secure analysis pattern for handling legal cases. to be published in: SugarLoafPLoP'2007-6th Latin America Conference on Pattern Languages of Programming, http://sugarloafplop.dsc.upe.br/wwD.zip, 2007.
-
-
-
-
3
-
-
49049108986
-
-
U. R. T. Force. OMG Unified Modeling Language: Superstructure, August 2005. http://www.uml.org.
-
U. R. T. Force. OMG Unified Modeling Language: Superstructure, August 2005. http://www.uml.org.
-
-
-
-
4
-
-
34548155491
-
Eliciting confidentiality requirements in practice
-
IBM Press
-
S. F. Gürses, J. H. Jahnke, C. Obry, A. Onabajo, T. San-ten, and M. Price. Eliciting confidentiality requirements in practice. In CASCON '05: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pages 101-116. IBM Press, 2005.
-
(2005)
CASCON '05: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
, pp. 101-116
-
-
Gürses, S.F.1
Jahnke, J.H.2
Obry, C.3
Onabajo, A.4
San-ten, T.5
Price, M.6
-
5
-
-
70350130621
-
A framework for security requirements engineering
-
New York, NY, USA, ACM Press
-
C. B. Haley, J. D. Moffett, R. Laney, and B. Nuseibeh. A framework for security requirements engineering. In SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems, pages 35-42, New York, NY, USA, 2006. ACM Press.
-
(2006)
SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems
, pp. 35-42
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
6
-
-
33746660228
-
Security engineering using problem frames
-
G. Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Communication Security ETRICS, Springer-Verlag
-
D. Hatebur, M. Heisel, and H. Schmidt. Security engineering using problem frames. In G. Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS), LNCS 3995, pages 238-253. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.3995
, pp. 238-253
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
7
-
-
34548181856
-
A pattern system for security requirements engineering
-
IEEE
-
D. Hatebur, M. Heisel, and H. Schmidt. A pattern system for security requirements engineering. In Proceedings of the International Conference on Availability, Reliability and Security (AReS), pages 356-365. IEEE, 2007.
-
(2007)
Proceedings of the International Conference on Availability, Reliability and Security (AReS)
, pp. 356-365
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
10
-
-
37849053100
-
Enhancing dependability of component-based systems
-
N. Abdennadher and F. Kordon, editors, Reliable Software Technologies, Ada Europe 2007, Springer-Verlag
-
A. Lanoix, D. Hatebur, M. Heisel, and J. Souquières. Enhancing dependability of component-based systems. In N. Abdennadher and F. Kordon, editors, Reliable Software Technologies - Ada Europe 2007, LNCS 4498, pages 41-54. Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.4498
, pp. 41-54
-
-
Lanoix, A.1
Hatebur, D.2
Heisel, M.3
Souquières, J.4
-
11
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
Poster Paper
-
L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett. Introducing abuse frames for analysing security requirements. In Proceedings of 11th IEEE International Requirements Engineering Conference (RE'03), pages 371-372, 2003. Poster Paper.
-
(2003)
Proceedings of 11th IEEE International Requirements Engineering Conference (RE'03)
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
13
-
-
84944683046
-
Security-critical system development with extended use cases
-
G. Popp, J. Jurjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In APSEC, pages 478-487, 2003.
-
(2003)
APSEC
, pp. 478-487
-
-
Popp, G.1
Jurjens, J.2
Wimmel, G.3
Breu, R.4
-
14
-
-
33750050331
-
-
Wiley & Sons
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. Wiley & Sons, 2005.
-
(2005)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
15
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
September
-
A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens. From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. In Proceedings of the RE'03 Workshop on Requirements for High Assurance Systems (RHAS), pages 49-56, September 2003.
-
(2003)
Proceedings of the RE'03 Workshop on Requirements for High Assurance Systems (RHAS)
, pp. 49-56
-
-
van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
|