-
1
-
-
70350451654
-
-
Common Criteria for Information Technology Security Evaluation, Version 3.1 September 2006
-
Common Criteria for Information Technology Security Evaluation, Version 3.1 (September 2006), http://www.commoncriteriaportal.org/public/expert/
-
-
-
-
2
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A., Laprie, J.-C., Randall, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11-33 (2004), http://se2c.uni.lu/tiki/se2c-bib- download.php?id=2433
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randall, B.3
Landwehr, C.4
-
3
-
-
84871477474
-
A systematic account of problem frames
-
Universitätsverlag Konstanz
-
Côté, I., Hatebur, D., Heisel, M., Schmidt, H., Wentzlaff, I.: A systematic account of problem frames. In: Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP 2007). Universitätsverlag Konstanz (2008)
-
(2007)
Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP
-
-
Côté, I.1
Hatebur, D.2
Heisel, M.3
Schmidt, H.4
Wentzlaff, I.5
-
5
-
-
34548155491
-
Eliciting confidentiality requirements in practice
-
IBM Press
-
Gürses, S., Jahnke, J.H., Obry, C., Onabajo, A., Santen, T., Price,M.: Eliciting confidentiality requirements in practice. In: CASCON 2005: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pp. 101-116. IBM Press (2005)
-
(2005)
CASCON 2005: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
, pp. 101-116
-
-
Gürses, S.1
Jahnke, J.H.2
Obry, C.3
Onabajo, A.4
Santen, T.5
Price, M.6
-
6
-
-
70350439335
-
-
Hatebur, D, Heisel, M, A foundation for requirements analysis of dependable software technical report, Technical report, Universität Duisburg-Essen
-
Hatebur, D., Heisel, M.: A foundation for requirements analysis of dependable software (technical report). Technical report, Universität Duisburg-Essen (2009), http://swe.uni-due.de/techrep/founddep.pdf
-
(2009)
-
-
-
7
-
-
33746660228
-
Security engineering using problem frames
-
Müller, G, ed, ETRICS 2006, Springer, Heidelberg
-
Hatebur, D., Heisel, M., Schmidt, H.: Security engineering using problem frames. In:Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 238-253. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3995
, pp. 238-253
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
8
-
-
34548181856
-
A pattern system for security requirements engineering
-
Werner, B, ed, IEEE, Los Alamitos
-
Hatebur, D., Heisel, M., Schmidt, H.: A pattern system for security requirements engineering. In: Werner, B. (ed.) Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pp. 356-365. IEEE, Los Alamitos (2007)
-
(2007)
Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions
, pp. 356-365
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
9
-
-
49049087976
-
Analysis and component-based realization of security requirements
-
IEEE, Los Alamitos
-
Hatebur, D., Heisel, M., Schmidt, H.: Analysis and component-based realization of security requirements. In: Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions, pp. 195-203. IEEE, Los Alamitos (2008)
-
(2008)
Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE Transactions
, pp. 195-203
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
10
-
-
56649104987
-
A formal metamodel for problem frames
-
Czarnecki, K, Ober, I, Bruel, J.-M.,Uhl, A, Völter, M, eds, MODELS 2008, Springer, Heidelberg
-
Hatebur, D., Heisel, M., Schmidt, H.: A formal metamodel for problem frames. In: Czarnecki, K., Ober, I., Bruel, J.-M.,Uhl, A., Völter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 68-82. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5301
, pp. 68-82
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
13
-
-
0029191909
-
Deriving specifications from requirements: An example
-
Seattle, USA, pp, ACM Press, New York
-
Jackson, M., Zave, P.: Deriving specifications from requirements: an example. In: Proceedings 17th Int. Conf. on Software Engineering, Seattle, USA, pp. 15-24. ACM Press, New York (1995)
-
(1995)
Proceedings 17th Int. Conf. on Software Engineering
, pp. 15-24
-
-
Jackson, M.1
Zave, P.2
-
14
-
-
0022250464
-
Dependability computing and fault tolerance: Concepts and terminology
-
June 1995
-
Laprie, J.-C.: Dependability computing and fault tolerance: Concepts and terminology. Fault-Tolerant Computing - Highlights from Twenty-Five Years, 2-13 (June 1995), http://lion.ee.ntu.edu.tw/Class/FTDS 2008/ Laprie-Definitions.pdf
-
Fault-Tolerant Computing - Highlights from Twenty-Five Years
, pp. 2-13
-
-
Laprie, J.-C.1
-
15
-
-
70350450488
-
-
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Technical report, TU Dresden and ULD Kiel, 5 (2006), http://dud.inf.tu-dresden. de/Anon-Terminology.shtml
-
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Technical report, TU Dresden and ULD Kiel, 5 (2006), http://dud.inf.tu-dresden. de/Anon-Terminology.shtml
-
-
-
-
16
-
-
70350437501
-
Safety vs. security
-
Stamatelatos, M.G, Blackman, H.S, eds, ASME Press, New York
-
Røstad, L., Tøndel, I.A., Line, M.B., Nordland, O.: Safety vs. security. In: Stamatelatos, M.G., Blackman, H.S. (eds.) Safety Assessment and Management - PSAM 8, Eighth International Conference on Probabilistic. ASME Press, New York (2006)
-
(2006)
Safety Assessment and Management - PSAM 8, Eighth International Conference on Probabilistic
-
-
Røstad, L.1
Tøndel, I.A.2
Line, M.B.3
Nordland, O.4
-
17
-
-
33751016038
-
Stepwise development of secure systems
-
Górski, J, ed, SAFECOMP 2006, Springer, Heidelberg
-
Santen, T.: Stepwise development of secure systems. In: Górski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 142-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4166
, pp. 142-155
-
-
Santen, T.1
|