-
1
-
-
33646524687
-
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets
-
Apr
-
Dianxiang Xu, Kendall E. Nygard, "Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets," IEEE Transactions on Software Engineering, vol. 32, no. 4, pp. 265-278, Apr., 2006.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.4
, pp. 265-278
-
-
Xu, D.1
Nygard, K.E.2
-
2
-
-
0141502155
-
An Approach for Modeling and Analysis of Security System Architectures
-
Sept/Oct
-
Yi Deng, Jiacun Wang, Jeffrey J.P. Tsai, Konstantin Beznosov, "An Approach for Modeling and Analysis of Security System Architectures," IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 5, pp. 1099-1119, Sept/Oct, 2003.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.2
Tsai, J.J.P.3
Beznosov, K.4
-
3
-
-
84869273607
-
Attack Trees
-
December
-
Bruce Schneier, "Attack Trees," Dr. Dobb's Journal December 1999. http://www.schneier.com/paper-attacktrees-fig1.html
-
(1999)
Dr. Dobb's Journal
-
-
-
4
-
-
63349103744
-
Security Threat Modeling: A Goal-Oriented Approach
-
Dallas, TX, Dec
-
Ebenezer Oladimeji, Sam Supakkul, and Lawrence Chung, "Security Threat Modeling: A Goal-Oriented Approach," Proceedings of SEA'06, Dallas, TX, Dec. 2006
-
(2006)
Proceedings of SEA'06
-
-
Oladimeji, E.1
Supakkul, S.2
Chung, L.3
-
6
-
-
63349105375
-
-
Suvda Myagmar, Adam J. Lee, and William Yurcik, Threat Modeling as a Basis for Security Requirements, Symposium on Requirements Engineering for Information Security (SREIS) in conjunction with 13th IEEE International Requirements Engineering Conference (RE), Paris, France, Aug., 2005.
-
Suvda Myagmar, Adam J. Lee, and William Yurcik, "Threat Modeling as a Basis for Security Requirements," Symposium on Requirements Engineering for Information Security (SREIS) in conjunction with 13th IEEE International Requirements Engineering Conference (RE), Paris, France, Aug., 2005.
-
-
-
-
8
-
-
5744229775
-
Deriving Security Requirements from Crosscutting Threat Descriptions
-
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh, "Deriving Security Requirements from Crosscutting Threat Descriptions," Proceedings of the Third Int'l Conf. Aspect-Oriented Software Development, pp. 112-121, 2004.
-
(2004)
Proceedings of the Third Int'l Conf. Aspect-Oriented Software Development
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.C.2
Nuseibeh, B.3
-
9
-
-
63349090616
-
Threat-Driven Design and Analysis of Secure Software Architectures
-
June
-
Dianxiang Xu and Josh Pauli, "Threat-Driven Design and Analysis of Secure Software Architectures," Journal of Information Assurance (JIAS), vol. 1, no. 2, June 2006.
-
(2006)
Journal of Information Assurance (JIAS)
, vol.1
, Issue.2
-
-
Xu, D.1
Pauli, J.2
-
10
-
-
0034291619
-
-
Axel van Lamsweerde and Emmanuel Letier, Handling Obstacles in Goal-Oriented Requirements Engineering, IEEE Transactions on Software Enineering. Special Issue on Exception Handling, 2000.
-
Axel van Lamsweerde and Emmanuel Letier, "Handling Obstacles in Goal-Oriented Requirements Engineering," IEEE Transactions on Software Enineering. Special Issue on Exception Handling, 2000.
-
-
-
-
11
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-Models
-
Edinburgh, pp, May
-
Axel van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional Anti-Models," Proceedings of ICSE'04, 26th International Conference on Software Engineering,Edinburgh, pp.148-157, May 2004.
-
(2004)
Proceedings of ICSE'04, 26th International Conference on Software Engineering
, pp. 148-157
-
-
Axel van Lamsweerde1
-
12
-
-
62849084676
-
Modeling, Validating and Automating Composition of Web Services
-
Yujian Fu, Zhijiang Dong, Xudong, "Modeling, Validating and Automating Composition of Web Services," ACM International Conference Proceeding Series, Proceedings of the 6th international conference on Web engineering, 2006.
-
(2006)
ACM International Conference Proceeding Series, Proceedings of the 6th international conference on Web engineering
-
-
Fu, Y.1
Zhijiang Dong, X.2
-
13
-
-
38049150308
-
A Petri Net Based XML Firewall Security Model for Web Services Invocation
-
MIT, Cambridge, Massachusetts, USA, Oct
-
Mihir M. Ayachit and Haiping Xu, "A Petri Net Based XML Firewall Security Model for Web Services Invocation," Proceedings of the International Conference on Communication, Network, and Information Security (CNIS 2006), pp. 61-67, MIT, Cambridge, Massachusetts, USA, Oct, 2006.
-
(2006)
Proceedings of the International Conference on Communication, Network, and Information Security (CNIS 2006)
, pp. 61-67
-
-
Ayachit, M.M.1
Xu, H.2
-
14
-
-
27744500390
-
Automated analysis of unified modeling language (UML) specifications
-
Master's thesis presented to the University of Waterloo, August
-
Meyer C. Tanuan, "Automated analysis of unified modeling language (UML) specifications." Master's thesis presented to the University of Waterloo, August 2001.
-
(2001)
-
-
Tanuan, M.C.1
-
15
-
-
18944361987
-
Model checking software architecture specifications in SAM
-
Ischia, Italy, July 15-19
-
Xudong He, Junhua Ding, J. Wang and Yi Deng, "Model checking software architecture specifications in SAM", Proceedings of International Conference on Software Engineering and Knowledge Engineering, Ischia, Italy, July 15-19, 2002.
-
(2002)
Proceedings of International Conference on Software Engineering and Knowledge Engineering
-
-
He, X.1
Junhua Ding, J.W.2
Deng, Y.3
-
16
-
-
1242320326
-
Formally analyzing software architectural specifications using SAM
-
Xudong He, Huiqun Yu, Tianjun Shi, Junhua Ding, Yi Deng, "Formally analyzing software architectural specifications using SAM," Journal of Systems and Software 71 (1-2), pp.11-29, 2004.
-
(2004)
Journal of Systems and Software
, vol.71
, Issue.1-2
, pp. 11-29
-
-
He, X.1
Yu, H.2
Shi, T.3
Ding, J.4
Deng, Y.5
-
17
-
-
0036149234
-
Correctness by Construction: Developing a. Commercial Secure System
-
Anthony Hall and Roderick Chapman, "Correctness by Construction: Developing a. Commercial Secure System," IEEE Software, Jan/Feb 2002, pp18 - 25, 2002.
-
(2002)
IEEE Software, Jan/Feb 2002
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
18
-
-
0010314258
-
-
Carnegie-Mellon University, Pittsburgh, PA, Feb
-
Ken McMllan. "The SMV System". Carnegie-Mellon University, Pittsburgh, PA, Feb. 1992.
-
(1992)
The SMV System
-
-
McMllan, K.1
-
19
-
-
0031649229
-
Property Specification Patterns for Finite-State Verification
-
Clearwater Beach, FL, USA
-
Matthew B. Dwyer , George S. Avrunin , James C. Corbett. "Property Specification Patterns for Finite-State Verification." 2nd Workshop on Formal Methods in Software Practice, pp 7 - 15, Clearwater Beach, FL, USA, 1998.
-
(1998)
2nd Workshop on Formal Methods in Software Practice
, pp. 7-15
-
-
Dwyer, M.B.1
Avrunin, G.S.2
Corbett, J.C.3
|