-
1
-
-
38949162568
-
PWSSec: Process for Web services security
-
Chicago, USA
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "PWSSec: Process for Web services security," IEEE International Conference on Web Services 2006, pp. 213-222, Chicago, USA, 2006.
-
(2006)
IEEE International Conference on Web Services
, pp. 213-222
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
2
-
-
2942683823
-
-
M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, and T. Newling, Patterns: Services Oriented Architectures and Web Services, 2004.
-
(2004)
Patterns: Services Oriented Architectures and Web Services
-
-
Endrei, M.1
Ang, J.2
Arsanjani, A.3
Chua, S.4
Comte, P.5
Krogdahl, P.6
Luo, M.7
Newling, T.8
-
3
-
-
26844477141
-
Patterns: Service-Oriented Architecture and Web Services
-
1st ed
-
M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, and T. Newling, Patterns: Service-Oriented Architecture and Web Services, 1st ed., IBM Redbook, 2004. p. 345, 2004.
-
(2004)
IBM Redbook
, pp. 345
-
-
Endrei, M.1
Ang, J.2
Arsanjani, A.3
Chua, S.4
Comte, P.5
Krogdahl, P.6
Luo, M.7
Newling, T.8
-
4
-
-
77954341505
-
Web services enterprise security architecture: A case study
-
Fairfax, Virginia, USA
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Web services enterprise security architecture: A case study," ACM Workshop on Security on Web Services, pp. 10-19, Fairfax, Virginia, USA, 2005.
-
(2005)
ACM Workshop on Security on Web Services
, pp. 10-19
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
5
-
-
85027169738
-
Web servicesbased security requirement elicitation
-
Paris, France
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Web servicesbased security requirement elicitation," 1st International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER'05) in conjunction with IEEE RE'05, Paris, France, 2005.
-
(2005)
1st International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER'05) in conjunction with IEEE RE'05
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
6
-
-
68249148138
-
Security requirements for Web services based on SIREN
-
Paris, France
-
C. Gutiérrez, B. Moros, A. Toval, E. Fernández-Medina, and M. Piattini, "Security requirements for Web services based on SIREN," Symposium on Requirements Engineering for Information Security, Paris, France, 2005.
-
(2005)
Symposium on Requirements Engineering for Information Security
-
-
Gutiérrez, C.1
Moros, B.2
Toval, A.3
Fernández-Medina, E.4
Piattini, M.5
-
7
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
A. Toval, J. Nicolás, B. Moros, and F. García, "Requirements reuse for improving information systems security: A practitioner's approach," Requirements Engineering Journal, vol. 6, pp. 205-219, 2001.
-
(2001)
Requirements Engineering Journal
, vol.6
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
-
8
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, V. Lotz, and G. Wimmel, "Key issues of a formally based process model for security engineering," 16th International Conference on Software and Systems Engineering and their Applications (ICSSEA'03), 2003.
-
(2003)
16th International Conference on Software and Systems Engineering and their Applications (ICSSEA'03)
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Lotz, V.6
Wimmel, G.7
-
9
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier, "Attack trees: Modeling security threats," Dr. Dobb's Journal, vol. 24, no. 12, pp. 21-29, 1999.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
10
-
-
85027130455
-
-
WS-I, Security challenges, threats and countermeasures versión 1.0, 2005: WS-I, 2005
-
WS-I, "Security challenges, threats and countermeasures versión 1.0," vol. 2005: WS-I, 2005.
-
-
-
-
11
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sydney, Australia
-
G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," TOOLS-37'00, pp. 34-44, Sydney, Australia, 2000.
-
(2000)
TOOLS-37'00
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
12
-
-
0037240812
-
-
I. Alexander, Misuse cases: Use cases with hostile intent, IEEE Computer Software, 20, pp. 58-66, 2003
-
I. Alexander, "Misuse cases: Use cases with hostile intent," IEEE Computer Software, vol. 20, pp. 58-66, 2003.
-
-
-
-
13
-
-
0038226150
-
Attack modelling for information security and survivability
-
A. P. Moore, R. J. Ellison, and R. C. Linger, "Attack modelling for information security and survivability," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, CMU/SEI-2001-TN-001, 2001.
-
(2001)
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, CMU/SEI-2001-TN-001
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
17
-
-
2942757657
-
Engineering security requirements
-
D. G. Firesmith, "Engineering security requirements," Journal of Object Technology, vol. 2, pp. 53-68, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, pp. 53-68
-
-
Firesmith, D.G.1
-
18
-
-
33644682771
-
-
SEI, Technical Note CMU/SEI-2003-TN-033, Dec
-
D. G. Smith, "Common concepts underlying safety, security, and survivability engineering," SEI, Technical Note CMU/SEI-2003-TN-033, Dec. 2003.
-
(2003)
Common concepts underlying safety, security, and survivability engineering
-
-
Smith, D.G.1
-
19
-
-
2942753973
-
Specifying reusable security requirements
-
D. G. Firesmith, "Specifying reusable security requirements," Journal of Object Technology, vol. 3, pp. 61-75, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, pp. 61-75
-
-
Firesmith, D.G.1
-
20
-
-
2942563935
-
A process framework for characterising security properties of component-based software systems
-
K. M. Khan and J. Han, "A process framework for characterising security properties of component-based software systems," Australian Software Engineering Conference (ASWEC'04), pp. 358-367, 2004.
-
(2004)
Australian Software Engineering Conference (ASWEC'04)
, pp. 358-367
-
-
Khan, K.M.1
Han, J.2
-
21
-
-
35248878476
-
Designing secure integration architectures
-
G. Jonsdottir, L. Davis, and R. Gamble, "Designing secure integration architectures," ICCBSS 2003, pp. 112-122, 2003.
-
(2003)
ICCBSS 2003
, pp. 112-122
-
-
Jonsdottir, G.1
Davis, L.2
Gamble, R.3
-
23
-
-
32044433021
-
Core security requirements artefacts
-
Open University, Department of Computing, 24
-
J. D. Moffett, C. B. Haley, and B. Nuseibeh, "Core security requirements artefacts," Open University, Department of Computing 2004/24, 2004.
-
(2004)
-
-
Moffett, J.D.1
Haley, C.B.2
Nuseibeh, B.3
-
24
-
-
85027141417
-
-
N. R. Mead, E. D. Hough, and T. R. S. II, Security quality requirements engineering (SQUARE) methodology, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA CMU/SEI-2005-TR-009, Nov. 2005.
-
N. R. Mead, E. D. Hough, and T. R. S. II, "Security quality requirements engineering (SQUARE) methodology," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA CMU/SEI-2005-TR-009, Nov. 2005.
-
-
-
-
25
-
-
85027147560
-
-
G. Lami, QuARS: A tool for analyzing requirements, Carnegie Mellon University, Sofware Engineering Institute, Pittsburgh, Technical Report CMU/SEI-2005-TR-014, Sept. 2005.
-
G. Lami, "QuARS: A tool for analyzing requirements," Carnegie Mellon University, Sofware Engineering Institute, Pittsburgh, Technical Report CMU/SEI-2005-TR-014, Sept. 2005.
-
-
-
-
26
-
-
0022754942
-
Advances in software inspections
-
M. E. Fagan, "Advances in software inspections," IEEE Trans. Softw. Eng., vol. 12, no. 7, pp. 744-751, 1986.
-
(1986)
IEEE Trans. Softw. Eng
, vol.12
, Issue.7
, pp. 744-751
-
-
Fagan, M.E.1
-
27
-
-
0010381933
-
Internet security glossary
-
RFC 2828, ́
-
R. Shirey, "Internet security glossary," (RFC 2828), 2000. ́
-
(2000)
-
-
Shirey, R.1
-
28
-
-
85027161799
-
-
F. L. Crespo, M. Á. A. Gómez, J. Candau, and J. A. Mañss, MAGERIT, Versión 2. Metodologías de Análisis y Gestión de Riesgos de los Sistemas de Información. III-Guía de Técnicas, Ministerio de Administraciones Públicas, Madrid NIPO-326-05-047-X, 16 de Junio de 2005, 2005
-
F. L. Crespo, M. Á. A. Gómez, J. Candau, and J. A. Mañss, "MAGERIT - Versión 2. Metodologías de Análisis y Gestión de Riesgos de los Sistemas de Información. III-Guía de Técnicas," Ministerio de Administraciones Públicas, Madrid NIPO-326-05-047-X, 16 de Junio de 2005, 2005.
-
-
-
-
29
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," Requirements Engineering Journal, vol. 10, pp. 34-44, 2005.
-
(2005)
Requirements Engineering Journal
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
30
-
-
0003791651
-
W3C Web Services Description Language (WSDL) 1.1 - W3C Note 15 March 2001
-
E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, "W3C Web Services Description Language (WSDL) 1.1 - W3C Note 15 March 2001," 2001.
-
(2001)
-
-
Christensen, E.1
Curbera, F.2
Meredith, G.3
Weerawarana, S.4
-
31
-
-
13644270287
-
A reuse-based approach to determining security requirements
-
Klangenfurt, Velden, Austria
-
G. Sindre, D. G. Firesmith, and A. L. Opdhal, "A reuse-based approach to determining security requirements," 9th International Workshop on Requirements Engineering: Foundation of Software Quality (REFSQ'03), pp. 127-136, Klangenfurt, Velden, Austria, 2003.
-
(2003)
9th International Workshop on Requirements Engineering: Foundation of Software Quality (REFSQ'03)
, pp. 127-136
-
-
Sindre, G.1
Firesmith, D.G.2
Opdhal, A.L.3
-
32
-
-
33644973176
-
Applying the Tropos methodology for analysing Web services requirements and reasoning about qualities of services
-
M. Aiello and P. Giorgini, "Applying the Tropos methodology for analysing Web services requirements and reasoning about qualities of services," UPGRADE, vol. 5, pp. 20-26, 2004.
-
(2004)
UPGRADE
, vol.5
, pp. 20-26
-
-
Aiello, M.1
Giorgini, P.2
-
33
-
-
20444481470
-
Specification and querying of security constraints in the EFSOC framework
-
New York City, USA
-
K. Leune, M. Papazaglou, and W.-J. van den Heuvel, "Specification and querying of security constraints in the EFSOC framework," International Conference on Service Oriented Computing, pp. 125-133, New York City, USA, 2004.
-
(2004)
International Conference on Service Oriented Computing
, pp. 125-133
-
-
Leune, K.1
Papazaglou, M.2
van den Heuvel, W.-J.3
-
34
-
-
20444440807
-
Sound development of secure service-based systems
-
New York, USA
-
M. Deubler, J. Grünbauer, J. Jürjens, and G. Wimmel, "Sound development of secure service-based systems," 2nd International Conference on Service Oriented Computing (ICSOC'04), pp. 115-124, New York, USA, 2004.
-
(2004)
2nd International Conference on Service Oriented Computing (ICSOC'04)
, pp. 115-124
-
-
Deubler, M.1
Grünbauer, J.2
Jürjens, J.3
Wimmel, G.4
-
35
-
-
18944368586
-
Towards a model-based and incremental development process for service-based systems
-
Innsbruck, Austria
-
M. Deubler, J. Grünbauer, G. Popp, G. Wimmel, and C. Salzmann, "Towards a model-based and incremental development process for service-based systems," IASTED Conference on Software Engineering (IASTED SE 2004), pp. 183-188, Innsbruck, Austria, 2004.
-
(2004)
IASTED Conference on Software Engineering (IASTED SE
, pp. 183-188
-
-
Deubler, M.1
Grünbauer, J.2
Popp, G.3
Wimmel, G.4
Salzmann, C.5
-
36
-
-
33749040692
-
Model-driven security based on a Web services security architecture
-
Orlando, Florida, USA
-
Y. Nakamura, M. Tatsubori, T. Imamura, and K. Ono, "Model-driven security based on a Web services security architecture," IEEE International Conference on Services Computing (SCC'05), pp. 7-15, Orlando, Florida, USA, 2005.
-
(2005)
IEEE International Conference on Services Computing (SCC'05)
, pp. 7-15
-
-
Nakamura, Y.1
Tatsubori, M.2
Imamura, T.3
Ono, K.4
-
37
-
-
29744447253
-
Business-driven application security: From modeling to managing secure applications
-
N. Nagaratnam, A. Nadalin, M. A. Hondo, M. McIntosh, and P. Austel, "Business-driven application security: From modeling to managing secure applications," IBM Syst. J., vol. 44, pp. 847-867, 2005.
-
(2005)
IBM Syst. J
, vol.44
, pp. 847-867
-
-
Nagaratnam, N.1
Nadalin, A.2
Hondo, M.A.3
McIntosh, M.4
Austel, P.5
-
38
-
-
26444432193
-
Web service engineering - Advancing a new software engineering
-
Sydney, Australia
-
M. Breu, R. Breu, M. Hafner, and A. Nowak, "Web service engineering - Advancing a new software engineering," 5th International Conference on Web Engineering (ICWE'05), pp. 8-18, Sydney, Australia, 2005.
-
(2005)
5th International Conference on Web Engineering (ICWE'05)
, pp. 8-18
-
-
Breu, M.1
Breu, R.2
Hafner, M.3
Nowak, A.4
-
39
-
-
17044391834
-
Trustworthy Web services: Actions for
-
J. Zhang, "Trustworthy Web services: Actions for now," IEEE IT Pro, vol. 7, pp. 32-36, 2005.
-
(2005)
IEEE IT Pro
, vol.7
, pp. 32-36
-
-
Zhang, J.1
-
40
-
-
33747187462
-
Developing Web services security systems: A case study
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Developing Web services security systems: A case study," International Journal of Web Engineering and Techonlogy, vol. 2, pp. 292-306, 2006.
-
(2006)
International Journal of Web Engineering and Techonlogy
, vol.2
, pp. 292-306
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
41
-
-
68249154018
-
Security risk analysis in Web services systems
-
Setúbal, Portugal
-
C. Gutierrez, E. Fernández-Medina, and M. Piattini, "Security risk analysis in Web services systems," International Conference on Security and Cryptography (SECRYPT 2006), pp. 425-430, Setúbal, Portugal, 2006.
-
(2006)
International Conference on Security and Cryptography (SECRYPT
, pp. 425-430
-
-
Gutierrez, C.1
Fernández-Medina, E.2
Piattini, M.3
|