-
3
-
-
70349450888
-
-
A.I. Antón, ed., special issue on Requirements Engineering for Information Security, Requirements Eng., Dec. 2002, pp. 177-287.
-
A.I. Antón, ed., special issue on "Requirements Engineering for Information Security," Requirements Eng., Dec. 2002, pp. 177-287.
-
-
-
-
4
-
-
40449096402
-
Security Requirements Engineering: A Framework for Representation and Analysis
-
Jan
-
C.B. Haley et al., "Security Requirements Engineering: A Framework for Representation and Analysis," IEEE Trans. Software Eng., Jan. 2008, pp. 133-153.
-
(2008)
IEEE Trans. Software Eng
, pp. 133-153
-
-
Haley, C.B.1
-
9
-
-
85008523798
-
Weaving Together Requirements and Architectures
-
Mar
-
B. Nuseibeh, "Weaving Together Requirements and Architectures," Computer, Mar. 2001, pp. 115-117.
-
(2001)
Computer
, pp. 115-117
-
-
Nuseibeh, B.1
-
10
-
-
70349444650
-
-
CRISTAL UK, Final Project Report, report no. EN-CRISTAL-UK/WP0/FPR/D1.1, 19 Oct, Eurocontrol;
-
C. Foster and M. Watson, "CRISTAL UK - Final Project Report," report no. EN-CRISTAL-UK/WP0/FPR/D1.1, 19 Oct. 2007, Eurocontrol; www.eurocontrol.int/cascade/public/site_preferences/ display_library_list_public.html.
-
(2007)
-
-
Foster, C.1
Watson, M.2
-
12
-
-
0343347262
-
A Model for a Causal Logic for Requirements Engineering
-
Mar
-
J. Moffett et al., "A Model for a Causal Logic for Requirements Engineering," Requirements Eng., Mar. 1996, pp. 27-46.
-
(1996)
Requirements Eng
, pp. 27-46
-
-
Moffett, J.1
-
13
-
-
84924180488
-
-
updated ed, Cambridge Univ. Press
-
S. Toulmin, The Uses of Argument, updated ed., Cambridge Univ. Press, 2003.
-
(2003)
The Uses of Argument
-
-
Toulmin, S.1
-
14
-
-
70349445850
-
-
T.P. Kelly, Arguing Safety - A Systematic Approach to Safety Case Management, doctoral dissertation, University of York, 1999.
-
T.P. Kelly, "Arguing Safety - A Systematic Approach to Safety Case Management," doctoral dissertation, University of York, 1999.
-
-
-
-
15
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-Models
-
IEEE CS Press
-
A. van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional Anti-Models," Proc. 26th Int'l Conf. Software Eng. (ICSE 04), IEEE CS Press, 2004, pp. 148-157.
-
(2004)
Proc. 26th Int'l Conf. Software Eng. (ICSE 04)
, pp. 148-157
-
-
van Lamsweerde, A.1
-
16
-
-
39449099894
-
Security Requirements for the Rest of Us: A Survey
-
Jan./Feb
-
I.A. Tøndel, M.G. Jaatun, and P.H. Meland, "Security Requirements for the Rest of Us: A Survey," IEEE Software, Jan./Feb. 2008, pp. 20-27.
-
(2008)
IEEE Software
, pp. 20-27
-
-
Tøndel, I.A.1
Jaatun, M.G.2
Meland, P.H.3
|