-
5
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Charles Haley, Robin Laney, Jonathan Moffett, and Bashar Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng. (TSE), 34(1):133-153, 2008.
-
(2008)
IEEE Trans. Softw. Eng. (TSE)
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
6
-
-
27644537252
-
Modeling Security Requirements Through Ownership, Permission and Delegation
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of RE, volume 5, 2005.
-
(2005)
Proc. of RE
, vol.5
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
7
-
-
17044394776
-
The effect of trust assumptions on the elaboration of security requirements
-
CB Haley, RC Laney, JD Moffett, and B. Nuseibeh. The effect of trust assumptions on the elaboration of security requirements. In Proc. of RE, pages 102-111, 2004.
-
(2004)
Proc. of RE
, pp. 102-111
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
9
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A.L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
10
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett. Introducing abuse frames for analysing security requirements. In Proc. of RE, pages 371-372, 2003.
-
(2003)
Proc. of RE
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
11
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
F. Massacci, M. Prest, and N. Zannone. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces, 27(5):445-455, 2005.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
12
-
-
47949100642
-
Secure and Dependable Patterns in Organizations: An Empirical Approach
-
Y. Asnar, P. Giorgini, F. Massacci, A. Saidane, R. Bonato, V. Meduri, and C. Riccucci. Secure and Dependable Patterns in Organizations: An Empirical Approach. In Proc. of RE, pages 287-292, 2007.
-
(2007)
Proc. of RE
, pp. 287-292
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Saidane, A.4
Bonato, R.5
Meduri, V.6
Riccucci, C.7
-
13
-
-
0003944811
-
-
PhD thesis, University of Toronto Toronto, Ont, Canada, Canada
-
E.S.K. Yu. Modelling strategic relationships for process reengineering. PhD thesis, University of Toronto Toronto, Ont., Canada, Canada, 1996.
-
(1996)
Modelling strategic relationships for process reengineering
-
-
Yu, E.S.K.1
-
14
-
-
3142750497
-
Tropos: An Agent-Oriented Software Development Methodology
-
P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos. Tropos: An Agent-Oriented Software Development Methodology. Autonomous Agents and Multi-Agent Systems, 8(3):203-236, 2004.
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
15
-
-
40049083379
-
-
Bas Graaf, Sven Weber, and Arie van Deursen. Model-driven migration of supervisory machine control architectures. J. Syst. Softw., 81(4):517-535, 2008.
-
Bas Graaf, Sven Weber, and Arie van Deursen. Model-driven migration of supervisory machine control architectures. J. Syst. Softw., 81(4):517-535, 2008.
-
-
-
-
17
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Aug
-
David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. Proposed nist standard for role-based access control. ACM Transactions on Information and System Security, 4(3):224 - 274, Aug. 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Richard Kuhn, D.4
Chandramouli, R.5
-
20
-
-
38549098015
-
Sampaio do Prado Leite, and John Mylopoulos. From goals to aspects: Discovering aspects from goal models
-
Yijun Yu, Julio Cesar Sampaio do Prado Leite, and John Mylopoulos. From goals to aspects: Discovering aspects from goal models. In Proc. of RE, pages 38-47, 2004.
-
(2004)
Proc. of RE
, pp. 38-47
-
-
Yu, Y.1
Cesar, J.2
-
21
-
-
33646512996
-
-
Jaap Gordijn, Eric Yu, and Bas van der Raadt. e-service design using i* and e3value modeling. IEEE Software, 2006.
-
Jaap Gordijn, Eric Yu, and Bas van der Raadt. e-service design using i* and e3value modeling. IEEE Software, 2006.
-
-
-
-
22
-
-
33746034514
-
An empirical evaluation of the i* framework in a model-based software generation environment
-
Hugo Estrada et al. An empirical evaluation of the i* framework in a model-based software generation environment. In Proc. of CAiSE, pages 513-527, 2006.
-
(2006)
Proc. of CAiSE
, pp. 513-527
-
-
Estrada, H.1
-
24
-
-
49049102597
-
Towards a comprehensive framework for secure systems development
-
Haralambos Mouratidis, Jan Jurjens, and Jorge Fox. Towards a comprehensive framework for secure systems development. In Proc. of CAiSE, 2006.
-
(2006)
Proc. of CAiSE
-
-
Mouratidis, H.1
Jurjens, J.2
Fox, J.3
-
25
-
-
33746064515
-
Security Engineering with Patterns: Origins, Theoretical Model, and New Applications
-
Springer
-
Markus Schumacher. Security Engineering with Patterns: Origins, Theoretical Model, and New Applications. LNCS, Vol.2754, Springer, 2003.
-
(2003)
LNCS
, vol.2754
-
-
Schumacher, M.1
-
27
-
-
70349259645
-
Linking Patterns and Non-Functional Requirements
-
Ivan Araujo and Michael Weiss. Linking Patterns and Non-Functional Requirements. In Proc. of PLoP, 2002.
-
(2002)
Proc. of PLoP
-
-
Araujo, I.1
Weiss, M.2
-
29
-
-
54249158594
-
Towards automatic model synchronization from model transformations
-
Yingfei Xiong, Dongxi Liu, Zhenjiang Hu, Haiyan Zhao, Masato Takeichi, and Hong Mei. Towards automatic model synchronization from model transformations. In Proc. of IEEE/ACM International Conference on Automated Software Engineering (ASE), pages 164-173, 2007.
-
(2007)
Proc. of IEEE/ACM International Conference on Automated Software Engineering (ASE)
, pp. 164-173
-
-
Xiong, Y.1
Liu, D.2
Hu, Z.3
Zhao, H.4
Takeichi, M.5
Mei, H.6
|