-
1
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Jan./Feb
-
I. Alexander, "Misuse cases: use cases with hostile intent," IEEE Software, vol. 20, pp. 58-66, Jan./Feb. 2003.
-
(2003)
IEEE Software
, vol.20
, pp. 58-66
-
-
Alexander, I.1
-
2
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Jan
-
G. Sindre and A. Opdahl, "Eliciting security requirements with misuse cases," Requirements Engineering, vol. 10, pp. 34-44, Jan. 2005.
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.2
-
3
-
-
84948950071
-
Initial Industrial Experience of Misuse Cases in Trade-off Analysis
-
Essen, Germany: IEEE Computer Society, pp
-
I. Alexander, "Initial Industrial Experience of Misuse Cases in Trade-off Analysis," in International Conference on Requirements Engineering Essen, Germany: IEEE Computer Society, pp. 61-70.
-
International Conference on Requirements Engineering
, pp. 61-70
-
-
Alexander, I.1
-
4
-
-
33745644756
-
-
J. Whittle, Specifying Precise Use Cases with Use Case Charts, in Mo DELS Satellite Events (Revised Selected Papers). 3844, J.-M. Bruel, Ed. Montego Bay, Jamaica: Springer-Verlag, pp. 290-301.
-
J. Whittle, "Specifying Precise Use Cases with Use Case Charts," in Mo DELS Satellite Events (Revised Selected Papers). vol. 3844, J.-M. Bruel, Ed. Montego Bay, Jamaica: Springer-Verlag, pp. 290-301.
-
-
-
-
5
-
-
37249051467
-
Precise Specification of Use Case Scenarios
-
Braga, Portugal: Springer
-
J. Whittle, "Precise Specification of Use Case Scenarios," in Fundamental Approaches to Software Engineering (FASE07). vol. LNCS 4422 Braga, Portugal: Springer, 2007, pp. 170-184.
-
(2007)
Fundamental Approaches to Software Engineering (FASE07)
, vol.LNCS 4422
, pp. 170-184
-
-
Whittle, J.1
-
6
-
-
17044437060
-
Modeling and Composing Scenario-Based Requirements with Aspects
-
Kyoto, Japan
-
J. Araújo, J. Whittle, and D.-K. Kim, "Modeling and Composing Scenario-Based Requirements with Aspects," in International Conference on Requirements Engineering Kyoto, Japan, 2004, pp. 58-67.
-
(2004)
International Conference on Requirements Engineering
, pp. 58-67
-
-
Araújo, J.1
Whittle, J.2
Kim, D.-K.3
-
7
-
-
38048999712
-
An Expressive Aspect Composition Language for UML State Diagrams
-
Nashville, TN
-
J. Whittle, A. Moreira, J. Araújo, R. Rabbi, P. Jayaraman, and A. Elkhodary, "An Expressive Aspect Composition Language for UML State Diagrams," in International Conference on Model Driven Engineering, Languages and Systems (MODELS), Nashville, TN, 2007, pp. 514-528.
-
(2007)
International Conference on Model Driven Engineering, Languages and Systems (MODELS)
, pp. 514-528
-
-
Whittle, J.1
Moreira, A.2
Araújo, J.3
Rabbi, R.4
Jayaraman, P.5
Elkhodary, A.6
-
8
-
-
57349125984
-
Composing Aspect Models with Graph Transformations
-
ACM Press
-
J. Whittle, J. Araújo, and A. Moreira, "Composing Aspect Models with Graph Transformations," in Workshop on Early Aspects at ICSE: ACM Press, 2006, pp. 59-65.
-
(2006)
Workshop on Early Aspects at ICSE
, pp. 59-65
-
-
Whittle, J.1
Araújo, J.2
Moreira, A.3
-
12
-
-
3543102147
-
Analysis of an Electronic Voting System
-
IEEE Computer Society Press
-
T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, "Analysis of an Electronic Voting System," in IEEE Symposium on Security and Privacy: IEEE Computer Society Press, 2004, pp. 27-40.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 27-40
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A.3
Wallach, D.4
-
13
-
-
57349173250
-
-
OMG, Unified Modeling Language 2.1.1 Specification (05-07-04), http://www.omg.org, Specification 2007.
-
OMG, "Unified Modeling Language 2.1.1 Specification (05-07-04)," http://www.omg.org, Specification 2007.
-
-
-
-
14
-
-
38049002989
-
Model Composition in Product Lines and Feature Interaction Detection using Critical Pair Analysis
-
Nashville, TN
-
P. Jayaraman, J. Whittle, A. Elkhodary, and H. Gomaa, "Model Composition in Product Lines and Feature Interaction Detection using Critical Pair Analysis," in International Conference on Model Driven Engineering, Languages and Systems (MODELS), Nashville, TN, 2007.
-
(2007)
International Conference on Model Driven Engineering, Languages and Systems (MODELS)
-
-
Jayaraman, P.1
Whittle, J.2
Elkhodary, A.3
Gomaa, H.4
-
18
-
-
57349196057
-
-
Information Assurance Technical Framework IATF, Release 3.1, Information Assurance Solutions, US National Security Agency, Fort Meade, MD Sep. 2002
-
"Information Assurance Technical Framework (IATF), Release 3.1," Information Assurance Solutions, US National Security Agency, Fort Meade, MD Sep. 2002.
-
-
-
-
27
-
-
34548563765
-
Computer-Aided Support for Secure Tropos
-
F. Massaci, J. Mylopoulos, and N. Zannone, "Computer-Aided Support for Secure Tropos," Automated Software Engineering, vol. 14, pp. 341-364, 2007.
-
(2007)
Automated Software Engineering
, vol.14
, pp. 341-364
-
-
Massaci, F.1
Mylopoulos, J.2
Zannone, N.3
-
28
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
Monterey Bay, CA
-
L. Liu, E. Yu, and J. Mylopoulos, "Security and Privacy Requirements Analysis within a Social Setting," in 11th IEEE International Requirements Engineering Conference Monterey Bay, CA, 2003.
-
(2003)
11th IEEE International Requirements Engineering Conference
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
30
-
-
57349167744
-
-
B. Schneier, Modeling Security Threats, in Dr. Dobb's Journal, 1999.
-
B. Schneier, "Modeling Security Threats," in Dr. Dobb's Journal, 1999.
-
-
-
-
31
-
-
34247543966
-
-
D. K. Kim, A Pattern-Based Technique for Developing UML Models of Access Control Systems, in 30th Annual International Computer Software and Applications Conference (COMPSAC) Chicago, IL, 2006, pp. 317-324
-
D. K. Kim, "A Pattern-Based Technique for Developing UML Models of Access Control Systems," in 30th Annual International Computer Software and Applications Conference (COMPSAC) Chicago, IL, 2006, pp. 317-324.
-
-
-
-
32
-
-
30644467106
-
Verifiable Composition of Access Control and Application Features
-
Stockholm, Sweden
-
E. Song, R. Reddy, R. B. France, I. Ray, G. Georg, and R. Alexander, "Verifiable Composition of Access Control and Application Features," in ACM Symposium on Access Control Models and Technologies (SACMAT) Stockholm, Sweden, 2005, pp. 120-129.
-
(2005)
ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 120-129
-
-
Song, E.1
Reddy, R.2
France, R.B.3
Ray, I.4
Georg, G.5
Alexander, R.6
|