-
1
-
-
39449099894
-
Security requirements for the rest of us: A survey
-
I. A. Tøndel, M. G. Jaatun, and P.H. Meland, "Security requirements for the rest of us: A survey," IEEE Software, vol. 25, no. 1, 2008.
-
(2008)
IEEE Software
, vol.25
, Issue.1
-
-
Tøndel, I.A.1
Jaatun, M.G.2
Meland, P.H.3
-
2
-
-
0002670359
-
Attack Trees - Modeling security threats
-
July 2001, Online, Available
-
B. Schneier, "Attack Trees - Modeling security threats," Dr. Dobb's Journal, July 2001. [Online]. Available: http://www.ddj.com/ 184411129
-
Dr. Dobb's Journal
-
-
Schneier, B.1
-
3
-
-
34547274967
-
-
Secure Software Inc, Secure Software Inc, Online, Available
-
Secure Software Inc. (2005) The CLASP Application Security Process. Secure Software Inc. [Online]. Available: http://www.securesoflware.com/ solulions/clasp.html
-
(2005)
The CLASP Application Security Process
-
-
-
4
-
-
49049108776
-
-
S. Lipner and M. Howard. (2005) The Trustworthy Computing Security Development Lifecycle. Microsoft. [Online]. Available: http: //msdn2.microsoft.com/en-us/library/ms995349.aspx
-
S. Lipner and M. Howard. (2005) The Trustworthy Computing Security Development Lifecycle. Microsoft. [Online]. Available: http: //msdn2.microsoft.com/en-us/library/ms995349.aspx
-
-
-
-
5
-
-
49049118545
-
Security requirements engineering: A framework for representation and analysis, IEEE Transactions on Software Engineering, vol
-
to appear
-
C. B. Haley, R. Laney, J. D. Moffett, and B. Nuseibeh, "Security requirements engineering: A framework for representation and analysis," IEEE Transactions on Software Engineering, vol. (to appear), 2007.
-
(2007)
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
6
-
-
39449084575
-
Extending XP practices to support security requirements engineering
-
New York, NY, USA: ACM Press
-
G. Boström, J. Wäyrynen, M. Bodén, K. Beznosov, and P. Kruchten, "Extending XP practices to support security requirements engineering," in SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems. New York, NY, USA: ACM Press, 2006, pp. 11-18.
-
(2006)
SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems
, pp. 11-18
-
-
Boström, G.1
Wäyrynen, J.2
Bodén, M.3
Beznosov, K.4
Kruchten, P.5
-
8
-
-
84931024051
-
-
I. Flechais, C. Mascolo, and M. A. Sasse, Integrating security and usability into the requirements and design process, International Journal of Electronic Security and Digital Forensics, 1, no. 1, pp. 12-26, 2007. [Online]. Available: hllp://inderscience. metapress.com/link.asp? id=j32 v 167864556552
-
I. Flechais, C. Mascolo, and M. A. Sasse, "Integrating security and usability into the requirements and design process," International Journal of Electronic Security and Digital Forensics, vol. 1, no. 1, pp. 12-26, 2007. [Online]. Available: hllp://inderscience. metapress.com/link.asp? id=j32 v 167864556552
-
-
-
-
9
-
-
49049121317
-
-
R. A. Caralli, J. F. Stevens, L. R. Young, and W. R. Wilson, Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process, CMU/SEI, Tech. Rep. CMU/SEI-2007-TR-012, 2007. [Online]. Available: http://www.cert.org/archive/pdf/07tr012.pdf
-
R. A. Caralli, J. F. Stevens, L. R. Young, and W. R. Wilson, "Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process," CMU/SEI, Tech. Rep. CMU/SEI-2007-TR-012, 2007. [Online]. Available: http://www.cert.org/archive/pdf/07tr012.pdf
-
-
-
-
10
-
-
49049085741
-
-
R. A. Caralli, The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management, CMU/SEI, Tech. Rep. CMU/SEI-2004-TR-010, 2004. [Online]. Available: hllp://www.sei.cmu.edu/ publicalions/documents/04.reports/04tr010.html
-
R. A. Caralli, "The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management," CMU/SEI, Tech. Rep. CMU/SEI-2004-TR-010, 2004. [Online]. Available: hllp://www.sei.cmu.edu/ publicalions/documents/04.reports/04tr010.html
-
-
-
-
12
-
-
0030148760
-
A comparison of two electronic idea generation techniques
-
Online, Available
-
M. Aiken, M. Vanjani, and J. Paolillo, "A comparison of two electronic idea generation techniques," Information & Management, vol. 30, no. 2, pp. 91-99, 1996. [Online]. Available: http://www.sciencedirect.com/science/article/B6VD0-3VVVRD2-5/2/ e3a232f84f07347c8c8bd7ae65314dcf
-
(1996)
Information & Management
, vol.30
, Issue.2
, pp. 91-99
-
-
Aiken, M.1
Vanjani, M.2
Paolillo, J.3
-
13
-
-
33748713830
-
Brainstorming pitfalls and best practices
-
C. E. Wilson, "Brainstorming pitfalls and best practices," interactions, vol. 13, no. 5, pp. 50-63, 2006.
-
(2006)
interactions
, vol.13
, Issue.5
, pp. 50-63
-
-
Wilson, C.E.1
-
15
-
-
49049117634
-
-
SODA - a Security-Oriented Software Development Framework. SINTEF ICT. [Online]. Available: http://www.sintef.no/soda
-
(2007) SODA - a Security-Oriented Software Development Framework. SINTEF ICT. [Online]. Available: http://www.sintef.no/soda
-
-
-
|