-
1
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
H. Mouratidis, P. Giorgini, and G. Manson, "When security meets software engineering: a case of modelling secure information systems," Information Systems, vol. 30, no. 8, pp. 609-629, 2005.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
2
-
-
67249120924
-
Security economics and the internal market
-
The European Network and Information Security Agency ENISA, Tech. Rep, January 31st
-
R. Anderson, R. Bhme, R. Clayton, and T. Moore, "Security economics and the internal market," The European Network and Information Security Agency (ENISA), Tech. Rep., January 31st. 2008.
-
(2008)
-
-
Anderson, R.1
Bhme, R.2
Clayton, R.3
Moore, T.4
-
3
-
-
49049093094
-
Developing secure software
-
July
-
N. Davis, "Developing secure software," Software Tech News, vol. 8, no. 2, pp. 3-7, July 2005.
-
(2005)
Software Tech News
, vol.8
, Issue.2
, pp. 3-7
-
-
Davis, N.1
-
5
-
-
34548177309
-
How can the developer benefit from security modeling?
-
Vienna, Austria: IEEE Computer Society
-
S. Ardi, D. Byers, P. H. Meland, I. A. Tøndel, and N. Shahmehri, "How can the developer benefit from security modeling?" in The first international workshop on secure software engineering (SecSE'07). Vienna, Austria: IEEE Computer Society, 2007, pp. 1017-1025.
-
(2007)
The first international workshop on secure software engineering (SecSE'07)
, pp. 1017-1025
-
-
Ardi, S.1
Byers, D.2
Meland, P.H.3
Tøndel, I.A.4
Shahmehri, N.5
-
7
-
-
85056016459
-
The mafiia handbook - an architectural description framework for information integration systems
-
SINTEF ICT, Tech. Rep
-
U. Johansen, E. Stav, and S. Walderhaug, "The mafiia handbook - an architectural description framework for information integration systems," SINTEF ICT, Tech. Rep. STF90 A05139, 2003.
-
(2003)
, vol.STF90
-
-
Johansen, U.1
Stav, E.2
Walderhaug, S.3
-
9
-
-
0029408391
-
The 4+1 view model of architecture
-
P. Kruchten, "The 4+1 view model of architecture," IEEE Software, vol. 12, no. 6, pp. 42-50, 1995.
-
(1995)
IEEE Software
, vol.12
, Issue.6
, pp. 42-50
-
-
Kruchten, P.1
-
10
-
-
70349708268
-
-
Yahoo! Inc, Flickr - photo sharing, http://www.flickr.com (accessed April 18th 2008).
-
Yahoo! Inc, "Flickr - photo sharing," http://www.flickr.com (accessed April 18th 2008).
-
-
-
-
11
-
-
70349725417
-
Flickr architecture - high scalability
-
http: //highscalability.com/flickr-architecture accessed April 18th
-
Hoff, Todd, "Flickr architecture - high scalability," http: //highscalability.com/flickr-architecture (accessed April 18th 2008).
-
(2008)
-
-
Hoff, T.1
-
13
-
-
34548188998
-
Requirements and approaches for a computer vulnerability data archive
-
Gaithersburg, MD
-
C. E. Landwehr, B. C. Gabrielson, and J. D. Humphrey, "Requirements and approaches for a computer vulnerability data archive," in Invitational Workshop on Computer Vulnerability Data Sharing, Gaithersburg, MD, 1996.
-
(1996)
Invitational Workshop on Computer Vulnerability Data Sharing
-
-
Landwehr, C.E.1
Gabrielson, B.C.2
Humphrey, J.D.3
-
14
-
-
70349705280
-
-
L. Clark, Businesses must keep back door locked to hackers, ComputerWeekly, 2008, no. March 20th, 2008.
-
L. Clark, "Businesses must keep back door locked to hackers," ComputerWeekly, vol. 2008, no. March 20th, 2008.
-
-
-
-
15
-
-
62949191860
-
-
The Eclipse Foundation, accessed November 1st 2008
-
The Eclipse Foundation, "Eclipse.org home," http://www. eclipse.org/ (accessed November 1st 2008).
-
Eclipse.org home
-
-
-
16
-
-
33750490069
-
-
Prentice Hall
-
C. Steel, R. Nagappan, and R. Lai, Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Prentice Hall, 2005.
-
(2005)
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
17
-
-
70349719193
-
-
The information security automation program and the security content automation protocol, accessed October 31st 2008
-
NIST and OSD and DHS and NSA and DISA, "The information security automation program and the security content automation protocol," http://nvd.nist.gov/scap.cfm (accessed October 31st 2008).
-
NIST and OSD and DHS and NSA and DISA
-
-
-
18
-
-
70349709947
-
-
SOMAP.org, Security officers management & analysis project, http://www.somap.org/ (accessed November 1st 2008).
-
SOMAP.org, "Security officers management & analysis project," http://www.somap.org/ (accessed November 1st 2008).
-
-
-
|