-
1
-
-
2342563770
-
-
Smith, S.W.Spafford, E.H., Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy, 2(1): (2004). p. 69-71.
-
Smith, S.W.Spafford, E.H., Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy, 2(1): (2004). p. 69-71.
-
-
-
-
2
-
-
84970947585
-
-
Devanbu, P.Stubblebine, S., Software engineering for security: a roadmap. ACM Press. Future of Software Engineering: (2000). p. 227-239.
-
Devanbu, P.Stubblebine, S., Software engineering for security: a roadmap. ACM Press. Future of Software Engineering: (2000). p. 227-239.
-
-
-
-
4
-
-
34748841665
-
-
Cheng, B.Atlee, M. Research Directions in Requirements Engineering, in Future of Software Engineering 2007 (FOSE 2007) Minneapolis, Minnesota (2007).
-
Cheng, B.Atlee, M. Research Directions in Requirements Engineering, in Future of Software Engineering 2007 (FOSE 2007) Minneapolis, Minnesota (2007).
-
-
-
-
5
-
-
58049188769
-
-
ISO27002, ISO/IEC 17799-27002 Code of Practice for Information Security Managament. (2005).
-
ISO27002, ISO/IEC 17799-27002 Code of Practice for Information Security Managament. (2005).
-
-
-
-
6
-
-
0142134956
-
Strategies for Software Reuse: A Principal Component Analysis of Reuse Practices
-
Rothenberger, M.A., Dooley, K.J., Kulkarni, U.R., Nada, N., Strategies for Software Reuse: A Principal Component Analysis of Reuse Practices. IEEE Trans. on Soft. Eng., 29(9): (2003). p. 825-837.
-
(2003)
IEEE Trans. on Soft. Eng
, vol.29
, Issue.9
, pp. 825-837
-
-
Rothenberger, M.A.1
Dooley, K.J.2
Kulkarni, U.R.3
Nada, N.4
-
7
-
-
0003885423
-
-
7th edition, Pearson Education Limited
-
Sommerville, I., Software Engineering (7th edition): Pearson Education Limited (2004).
-
(2004)
Software Engineering
-
-
Sommerville, I.1
-
8
-
-
2942753973
-
Specifying Reusable Security Requirements
-
Firesmith, D., Specifying Reusable Security Requirements. Journal of Object Technology, 3(1): (2004). p. 61-75.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
9
-
-
79551602978
-
The Semantic Web
-
Berners-Lee, T., Hendler, J., Lassila, O., The Semantic Web, in Scientific American.(2001): http://www.scientificamerican.com.
-
(2001)
Scientific American
-
-
Berners-Lee, T.1
Hendler, J.2
Lassila, O.3
-
10
-
-
85008034351
-
-
Brewster, C.O'Hara, K., Knowledge Representation with Ontologies: The Present and Future. IEEE Intelligent Systems, 19:1: (2004). p. 72-73.
-
Brewster, C.O'Hara, K., Knowledge Representation with Ontologies: The Present and Future. IEEE Intelligent Systems, 19:1: (2004). p. 72-73.
-
-
-
-
11
-
-
58149365542
-
Towards Principles for the Design of Ontologies used for Knowledge Sharing
-
Gruber, T., Towards Principles for the Design of Ontologies used for Knowledge Sharing. International Journal of Human-Computer Studies, 43(5/6): (1995). p. 907-928.
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.1
-
12
-
-
0242456149
-
Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
-
ACM Press Clouford, New Mexico, USA
-
Raskin, V., Hempelmann, C.F., Triezenberg, K.E., Nirenburg, S. Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool, in New Paradigms Security Workshop NSPW'01. ACM Press Clouford, New Mexico, USA (2001).
-
(2001)
New Paradigms Security Workshop NSPW'01
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg, S.4
-
13
-
-
58049186208
-
-
Tsoumas, B.Gritzalis, D., Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06). IEEE Computer Society, 1 : (2006).
-
Tsoumas, B.Gritzalis, D., Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06). IEEE Computer Society, 1 : (2006).
-
-
-
-
14
-
-
58049189771
-
-
Mouratidis, H.Giorgini, P., Integrating Security and Software Engineering: Advances and Future Visions: Idea Group Publishing (2007a).
-
Mouratidis, H.Giorgini, P., Integrating Security and Software Engineering: Advances and Future Visions: Idea Group Publishing (2007a).
-
-
-
-
15
-
-
27644567989
-
Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection
-
Essen, Alemania
-
Toval, A., Olmos, A., Piattini, M. Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection, in IEEE Joint International Conference on Requirements Engineering (ICRE'02 and RE'02). Essen, Alemania (2002b).
-
(2002)
IEEE Joint International Conference on Requirements Engineering (ICRE'02 and RE'02)
-
-
Toval, A.1
Olmos, A.2
Piattini, M.3
-
17
-
-
58049181857
-
-
ISO15408, ISO/IEC 15408 (Common Criteria v3.0) Information Technology Security Techniques-Evaluation Criteria for IT Security .(2005).
-
ISO15408, ISO/IEC 15408 (Common Criteria v3.0) "Information Technology Security Techniques-Evaluation Criteria for IT Security ".(2005).
-
-
-
-
18
-
-
17844409254
-
-
Requirements Engineering Journal.Springer,(, 2002a).p
-
Toval, A., Nicolás, J., Moros, B., García, F., Requirements Reuse for Improving Information Systems Security: A Practicioner's Approach. Requirements Engineering Journal.Springer,6(4): (2002a).p.205-219.
-
Requirements Reuse for Improving Information Systems Security: A Practicioner's Approach
, vol.6
, Issue.4
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
-
21
-
-
57549095655
-
-
Martínez, M.A., Lasheras, J., Toval, A., Piattini, M. An Audit Method of Personal Data Based on Requirements Engineering, in The 4th International Workshop on Security In Information Systems (WOSIS-2006). Paphos, Chipre (2006).
-
Martínez, M.A., Lasheras, J., Toval, A., Piattini, M. An Audit Method of Personal Data Based on Requirements Engineering, in The 4th International Workshop on Security In Information Systems (WOSIS-2006). Paphos, Chipre (2006).
-
-
-
-
22
-
-
1542273520
-
-
Lozano-Tello, A.Gómez-Pérez, A., ONTOMETRIC: A Method to Choose the Appropriate Ontology. Journal of Database Management. Special Issue on Ontological analysis, Evaluation, and Engineering of Business Systems Analysis Methods, 15(2): (2004).
-
Lozano-Tello, A.Gómez-Pérez, A., ONTOMETRIC: A Method to Choose the Appropriate Ontology. Journal of Database Management. Special Issue on Ontological analysis, Evaluation, and Engineering of Business Systems Analysis Methods, 15(2): (2004).
-
-
-
-
23
-
-
58049140385
-
-
Blanco, C., Lasheras, J., Valencia-García, R., Fernández-Media, E., Toval, A., Piattini, M. A Systematic Review and Comparison of Security Ontologies, in International Workshop on Frontiers in Availability, Reliability and Security (FARES) in conjunction with ARES. Barcelona (2007).
-
Blanco, C., Lasheras, J., Valencia-García, R., Fernández-Media, E., Toval, A., Piattini, M. A Systematic Review and Comparison of Security Ontologies, in International Workshop on Frontiers in Availability, Reliability and Security (FARES) in conjunction with ARES. Barcelona (2007).
-
-
-
-
24
-
-
58049140983
-
-
Dobson, G.Sawyer, P., Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on Dependable Requirements Engineering of Computerised Systems at NPPs, Institute for Energy Technology (IFE), Halden: (2006).
-
Dobson, G.Sawyer, P., Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on "Dependable Requirements Engineering of Computerised Systems at NPPs", Institute for Energy Technology (IFE), Halden: (2006).
-
-
-
-
25
-
-
8344270973
-
An Ontology for Modelling Security: The Tropos Approach
-
Springer Berlin/ Heidelberg
-
Mouratidis, H., Giorgini, P., Manson, G., An Ontology for Modelling Security: The Tropos Approach, in Knowledge-Based Intelligent Information and Engineering Systems. Springer Berlin/ Heidelberg. (2003) p. 1387-1394.
-
(2003)
Knowledge-Based Intelligent Information and Engineering Systems
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
26
-
-
58049178668
-
-
Agia Napa, Cyprus
-
Kim, A., Luo, J., Kang, M. Security Ontology for Annotating Resources in 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05). Agia Napa, Cyprus (2005).
-
(2005)
Security Ontology for Annotating Resources in 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05)
-
-
Kim, A.1
Luo, J.2
Kang, M.3
|