-
4
-
-
4243980729
-
Strategies for developing policies and requirements for secure e-commerce systems
-
A. K. Ghosh, Ed.: Kluwer Academic Publishers, Jan 15
-
Antón, A.I., Earp, J.B.: Strategies for Developing Policies and Requirements for Secure E-Commerce Systems. In ECommerce Security and Privacy, vol. 2, Advances In Information Security, A. K. Ghosh, Ed.: Kluwer Academic Publishers, Jan 15 2001, pp. 29-46.
-
(2001)
ECommerce Security and Privacy, Vol. 2, Advances in Information Security
, pp. 29-46
-
-
Antón, A.I.1
Earp, J.B.2
-
5
-
-
0024663219
-
The Chinese wall security policy
-
Oakland, CA USA: IEEE Computer Society Press, 1-3 May
-
Brewer, D.F.C., Nash, M.J.: The Chinese Wall security policy. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, CA USA: IEEE Computer Society Press, 1-3 May 1989, pp. 206-214.
-
(1989)
Proceedings of the 1989 IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
6
-
-
22144449985
-
Applying security design analysis to a service-based system
-
Chivers, H., Fletcher, M.: Applying Security Design Analysis to a service-based system. Software: Practice and Experience, 35(9) (2005), 873-897.
-
(2005)
Software: Practice and Experience
, vol.35
, Issue.9
, pp. 873-897
-
-
Chivers, H.1
Fletcher, M.2
-
7
-
-
84970947585
-
Software engineering for security: A roadmap
-
A. Finkelstein, Ed.: ACM Press
-
Devanbu, P., Stubblebine, S.: Software Engineering for Security: A Roadmap. In The Future of Software Engineering, A. Finkelstein, Ed.: ACM Press, 2000.
-
(2000)
The Future of Software Engineering
-
-
Devanbu, P.1
Stubblebine, S.2
-
8
-
-
2942753973
-
Specifying reusable security requirements
-
Jan-Feb
-
Firesmith, D.: Specifying Reusable Security Requirements. Journal of Object Technology, 3(1) (Jan-Feb 2004), 61-75.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
9
-
-
32044457421
-
Using trust assumptions with security requirements
-
April
-
Haley, C.B., Laney, R.C., Moffett, J.D., Nuseibeh, B.: Using Trust Assumptions with Security Requirements. Requirements Engineering Journal, 11(2) (April 2006), 138-151.
-
(2006)
Requirements Engineering Journal
, vol.11
, Issue.2
, pp. 138-151
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
10
-
-
5744229775
-
Deriving security requirements from crosscutting threat descriptions
-
Lancaster UK: ACM Press, 22-26 Mar
-
Haley, C.B., Laney, R.C., Nuseibeh, B.: Deriving Security Requirements from Crosscutting Threat Descriptions. In Proceedings of the Third International Conference on Aspect-Oriented Software Development (AOSD'04), Lancaster UK: ACM Press, 22-26 Mar 2004, pp. 112-121.
-
(2004)
Proceedings of the Third International Conference on Aspect-Oriented Software Development (AOSD'04)
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.C.2
Nuseibeh, B.3
-
11
-
-
34548557819
-
Arguing security: Validating security requirements using structured argumentation
-
Paris France, 29 Aug
-
Haley, C.B., Moffett, J.D., Laney, R., Nuseibeh, B.: Arguing Security: Validating Security Requirements Using Structured Argumentation. In Proceedings of the Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), Paris France, 29 Aug 2005.
-
(2005)
Proceedings of the Third Symposium on Requirements Engineering for Information Security (SREIS'05) Held in Conjunction with the 13th International Requirements Engineering Conference (RE'05)
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
12
-
-
84955606787
-
Applying 'practical' formal methods to the specification and analysis of security properties
-
St. Petersburg, Russia: Springer-Verlag Heidelberg, 21-23 May
-
Heitmeyer, C.L.: Applying 'Practical' Formal Methods to the Specification and Analysis of Security Properties. In Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Computer Security (MMM ACNS 2001), vol. 2052, St. Petersburg, Russia: Springer-Verlag Heidelberg, 21-23 May 2001, pp. 84-89.
-
(2001)
Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Computer Security (MMM ACNS 2001)
, vol.2052
, pp. 84-89
-
-
Heitmeyer, C.L.1
-
13
-
-
84953425434
-
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 1: Introduction and General Model. International Standard 15408-1, ISO/IEC, Geneva Switzerland, 1 Dec 1999
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 1: Introduction and General Model. International Standard 15408-1, ISO/IEC, Geneva Switzerland, 1 Dec 1999.
-
-
-
-
14
-
-
84953425435
-
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 2: Security Functional Requirements. International Standard 15408-2, ISO/IEC, Geneva Switzerland, 1 Dec 1999
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 2: Security Functional Requirements. International Standard 15408-2, ISO/IEC, Geneva Switzerland, 1 Dec 1999.
-
-
-
-
15
-
-
84953425436
-
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 3: Security Assurance Requirements. International Standard 15408-3, ISO/IEC, Geneva Switzerland, 1 Dec 1999
-
ISO/IEC: Information Technology-Security Techniques-Evaluation Criteria for IT Security-Part 3: Security Assurance Requirements. International Standard 15408-3, ISO/IEC, Geneva Switzerland, 1 Dec 1999.
-
-
-
-
19
-
-
0036305007
-
Integrating software lifecycle process standards with security engineering
-
Lee, Y., Lee, J., Lee, Z.: Integrating Software Lifecycle Process Standards with Security Engineering. Computers and Security, 21(4) (2002), 345-355.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 345-355
-
-
Lee, Y.1
Lee, J.2
Lee, Z.3
-
20
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Monterey, CA USA, 8-12 Sept
-
Liu, L., Yu, E., Mylopoulos, J.: Security and Privacy Requirements Analysis Within a Social Setting. In Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03), Monterey, CA USA, 8-12 Sept 2003, pp. 151-161.
-
(2003)
Proceedings of the 11th IEEE International Requirements Engineering Conference (RE'03)
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
21
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
Phoenix, AZ USA: IEEE Computer Society Press, 6-10 Dec
-
McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In Proceedings of the 15th Computer Security Applications Conference (ACSAC'99), Phoenix, AZ USA: IEEE Computer Society Press, 6-10 Dec 1999, pp. 55-64.
-
(1999)
Proceedings of the 15th Computer Security Applications Conference (ACSAC'99)
, pp. 55-64
-
-
McDermott, J.1
Fox, C.2
-
22
-
-
35048845022
-
Integrating security and systems engineering: Towards the modelling of secure information systems
-
Klagenfurt/Velden Austria: Springer-Verlag, 16-20 Jun
-
Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE'03), Klagenfurt/Velden Austria: Springer-Verlag, 16-20 Jun 2003, pp. 63-78.
-
(2003)
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE'03)
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
23
-
-
84953425437
-
-
NIST: An Introduction to Computer Security: The NIST Handbook. Special Pub SP 800-12, National Institute of Standards and Technology (NIST), Oct 1995
-
NIST: An Introduction to Computer Security: The NIST Handbook. Special Pub SP 800-12, National Institute of Standards and Technology (NIST), Oct 1995.
-
-
-
-
24
-
-
85008523798
-
Weaving together requirements and architectures
-
Mar
-
Nuseibeh, B.: Weaving Together Requirements and Architectures. Computer (IEEE), 34(3) (Mar 2001), 115-117.
-
(2001)
Computer (IEEE)
, vol.34
, Issue.3
, pp. 115-117
-
-
Nuseibeh, B.1
-
27
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
Sydney Australia, 20-23 Nov
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements by Misuse Cases. In Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-Pacific'00), Sydney Australia, 20-23 Nov 2000, pp. 120-131.
-
(2000)
Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-Pacific'00)
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
29
-
-
0030706923
-
Information security embedded in the design of telematics systems
-
Tettero, O., Out, D.J., Franken, H.M., Schot, J.: Information security embedded in the design of telematics systems. Computers and Security, 16(2) (1997), 145-164.
-
(1997)
Computers and Security
, vol.16
, Issue.2
, pp. 145-164
-
-
Tettero, O.1
Out, D.J.2
Franken, H.M.3
Schot, J.4
|