-
1
-
-
0037240812
-
Misuse Cases: Use Cases with Hostile Intent
-
I. Alexander. Misuse Cases: Use Cases with Hostile Intent. IEEE Software, 20(1):58-66, 2003.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
3
-
-
57849144969
-
-
Full statistics, Jan
-
CERT Coordination Center. Carnegie Mellon University. Full statistics, Jan 2008. http://www.cert.org/stats/fullstats.html.
-
(2008)
-
-
-
4
-
-
77950876924
-
Insider Threat: Protecting The Enterprise From Sabotage, Spying, And Theft
-
1 edition
-
E. Cole and S. Ring. Insider Threat: Protecting The Enterprise From Sabotage, Spying, And Theft. Syngress, 1 edition, 2005.
-
(2005)
Syngress
-
-
Cole, E.1
Ring, S.2
-
5
-
-
57849114146
-
-
Microsoft Corporation. Microsoft Threat Analysis and Modeling Tool, Version 2.1, 2006
-
Microsoft Corporation. Microsoft Threat Analysis and Modeling Tool, Version 2.1, 2006.
-
-
-
-
6
-
-
33845264120
-
-
E. B. Fernandez, M. VanHilst, M. M. L. Petrie, and S. Huang. Defining security requirements through misuse actions. In S. F. Ochoa and G.-C. Roman, editors, Advanced Software Engineering: Expanding the Frontiers of Software Technology, 219 of IFIP International Federation for Information Processing, 123-137. Springer Boston, November 2006.
-
E. B. Fernandez, M. VanHilst, M. M. L. Petrie, and S. Huang. Defining security requirements through misuse actions. In S. F. Ochoa and G.-C. Roman, editors, Advanced Software Engineering: Expanding the Frontiers of Software Technology, volume 219 of IFIP International Federation for Information Processing, 123-137. Springer Boston, November 2006.
-
-
-
-
7
-
-
57849088936
-
-
K. M. Goertzel, T. Winograd, H. L. McKinley, and P. Holley. Security in The Software Life Cycle. Technical Report DRAFT Version 1.2, Department of Homeland Security, August 2006
-
K. M. Goertzel, T. Winograd, H. L. McKinley, and P. Holley. Security in The Software Life Cycle. Technical Report DRAFT Version 1.2, Department of Homeland Security, August 2006.
-
-
-
-
8
-
-
0004256091
-
-
John Wiley & Sons, Inc, New York, NY, USA, 2nd edition
-
D. Gollmann. Computer Security. John Wiley & Sons, Inc., New York, NY, USA, 2nd edition, 2006.
-
(2006)
Computer Security
-
-
Gollmann, D.1
-
9
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
C. Haley, R. Laney, J. Moffett, and B. Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng., 34(1):133-153, 2008.
-
(2008)
IEEE Trans. Softw. Eng
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
10
-
-
49049087976
-
Analysis and component-based realization of security requirements
-
IEEE
-
D. Hatebur, M. Heisel, and H. Schmidt. Analysis and component-based realization of security requirements. In Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pages 195-203. IEEE, 2008.
-
(2008)
Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions
, pp. 195-203
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
12
-
-
23944475544
-
-
H. Mouratidis, P. Giorgini, G. Manson. When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Inf. Syst, Elsevier Science Ltd., Oxford, UK, v. 30, n. 8, p. 609-629, 2005.
-
H. Mouratidis, P. Giorgini, G. Manson. When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Inf. Syst, Elsevier Science Ltd., Oxford, UK, v. 30, n. 8, p. 609-629, 2005.
-
-
-
-
13
-
-
62949128148
-
Payment Card Industry (PCI) Data Security Standard
-
Payment Card Industry Security Standard Council, Technical Report 1.1
-
Payment Card Industry Security Standard Council. Payment Card Industry (PCI) Data Security Standard. Technical Report 1.1, 2006.
-
(2006)
-
-
-
14
-
-
57849093809
-
-
M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. Technical Report CMU/SEI-2004-TR-021 / ESC-TR-2004-021, National Threat Assessment Center, United States Secret Service and CERT Coordination Center, Software Engineering Institute, 2004.
-
M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. Technical Report CMU/SEI-2004-TR-021 / ESC-TR-2004-021, National Threat Assessment Center, United States Secret Service and CERT Coordination Center, Software Engineering Institute, 2004.
-
-
-
-
15
-
-
57849096430
-
-
S. T. Redwine Jr. Software Assurance: A Curriculum Guide to the Common Body of Knowledge to Produce, Acquire and Sustain Secure Software. Technical Report Version 1.2, US Departments of Homeland Security, October 2007.
-
S. T. Redwine Jr. Software Assurance: A Curriculum Guide to the Common Body of Knowledge to Produce, Acquire and Sustain Secure Software. Technical Report Version 1.2, US Departments of Homeland Security, October 2007.
-
-
-
-
16
-
-
33750050331
-
-
John Wiley & Sons Ltd
-
M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns Integrating Security and Systems Engineering. John Wiley & Sons Ltd, 2006.
-
(2006)
Security Patterns Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
17
-
-
38349130423
-
The Homeland Security Market Essential Dynamics and Trends
-
Technical report, Civitas Group LLC, December
-
M. Shaheen. The Homeland Security Market Essential Dynamics and Trends. Technical report, Civitas Group LLC, December 2006.
-
(2006)
-
-
Shaheen, M.1
-
18
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and L. Opdahl. Eliciting security requirements with misuse cases. Requir. Eng., 10(1):34-44, 2005.
-
(2005)
Requir. Eng
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, L.2
|