-
3
-
-
38549162276
-
On the secure software development process: CLASP and SDL compared
-
Minneapolis, MN, USA, IEEE CS Press
-
J. Gregoire, K. Buyens, B. De Win, R. Scandariato, and W. Joosen, "On the Secure Software Development Process: CLASP and SDL Compared," In Proceedings of the 3rd International Workshop on Software Engineering for Secure Systems (SESS'07), Minneapolis, MN, USA, IEEE CS Press, 2007, pp. 1-1
-
(2007)
Proceedings of the 3rd International Workshop on Software Engineering for Secure Systems (SESS'07)
, pp. 1-1
-
-
Gregoire, J.1
Buyens, K.2
De Win, B.3
Scandariato, R.4
Joosen, W.5
-
5
-
-
70449637484
-
-
Last Accessed March 2009
-
OWASP CLASP Project, http://www.owasp.org/index.php/Category:OWASP-CLASP- Project. Last Accessed March 2009.
-
-
-
-
6
-
-
84931024051
-
Integrating security and usability into the requirements and design process
-
Inderscience Publishers, Geneva, Switzerland
-
I. Flechais, C. Mascolo, and M.A. Sasse, "Integrating Security and Usability into the Requirements and Design Process," International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, Geneva, Switzerland, 2007, vol.1, no.1, pp. 12-26.
-
(2007)
International Journal of Electronic Security and Digital Forensics
, vol.1
, Issue.1
, pp. 12-26
-
-
Flechais, I.1
Mascolo, C.2
Sasse, M.A.3
-
7
-
-
54149109737
-
Towards building secure software systems
-
Informing Science Institute, CA, USA
-
A.S. Sodiya, S.A. Onashoga, and O.B. Ajayi, "Towards Building Secure Software Systems," Issues in Informing Science and Information Technology, Informing Science Institute, CA, USA, 2006, vol.3, pp. 635-646.
-
(2006)
Issues in Informing Science and Information Technology
, vol.3
, pp. 635-646
-
-
Sodiya, A.S.1
Onashoga, S.A.2
Ajayi, O.B.3
-
9
-
-
84954446528
-
Addressing software security risk and mitigations in the life cycle
-
Greenbelt, MD, USA
-
D. Gilliam, J. Powell, E. Haugh, and M. Bishop, "Addressing Software Security Risk and Mitigations in the Life Cycle," In Proceedings of the 28th Annual NASA Goddard Software Engineering Workshop (SEW'03), Greenbelt, MD, USA, 2003, pp. 201-206.
-
(2003)
Proceedings of the 28th Annual NASA Goddard Software Engineering Workshop (SEW'03)
, pp. 201-206
-
-
Gilliam, D.1
Powell, J.2
Haugh, E.3
Bishop, M.4
-
11
-
-
34047214891
-
Software testing for security
-
ScienceDirect
-
S.d. Vries, "Software Testing for Security," Network Security, ScienceDirect, 2007, vol.3, pp. 11-15.
-
(2007)
Network Security
, vol.3
, pp. 11-15
-
-
Vries, S.D.1
-
12
-
-
24344438696
-
Secure software development by example
-
IEEE CS Press
-
A. Apvrille and M. Pourzandi, "Secure Software Development by Example," IEEE Security and Privacy, IEEE CS Press, 2005, vol. 3, no. 4, pp. 10-17.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.4
, pp. 10-17
-
-
Apvrille, A.1
Pourzandi, M.2
-
13
-
-
47849113405
-
S2D-ProM: A strategy oriented process model for secure software development
-
Cap Esterel, French Riviera, France
-
M. Essafi, L. Labed, and H.B. Ghezala, "S2D-ProM: A Strategy Oriented Process Model for Secure Software Development," In Proceedings of the 2nd International Conference on Software Engineering Advances (ICSEA'07), Cap Esterel, French Riviera, France, 2007, p. 24.
-
(2007)
Proceedings of the 2nd International Conference on Software Engineering Advances (ICSEA'07)
, pp. 24
-
-
Essafi, M.1
Labed, L.2
Ghezala, H.B.3
-
14
-
-
49049108000
-
-
Technical Note CMU/SEI-2005-TN-024, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA
-
N. Davis, "Secure Software Development Life Cycle Processes: A Technology Scouting Report", Technical Note CMU/SEI-2005-TN-024, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, 2005.
-
(2005)
Secure Software Development Life Cycle Processes: A Technology Scouting Report
-
-
Davis, N.1
-
15
-
-
70350130621
-
A framework for security requirements engineering
-
Shanghai, China, ACM Press
-
C.B. Haley, J.D. Moffett, R. Laney, and B. Nuseibeh, "A Framework for Security Requirements Engineering," In Proceedings of the International Workshop on Software Engineering for Secure Software (SESS'06), Shanghai, China, ACM Press, 2006, pp. 35-41.
-
(2006)
Proceedings of the International Workshop on Software Engineering for Secure Software (SESS'06)
, pp. 35-41
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
16
-
-
70449631290
-
Software specification and attack languages
-
D. Khadraoui and F. Herrmann, Eds. IGI Global
-
M. Hussein, M. Raihan, & M. Zulkernine, "Software Specification and Attack Languages," In Advances in Enterprise Information Technology Security, D. Khadraoui and F. Herrmann, Eds. IGI Global, 2007.
-
(2007)
Advances in Enterprise Information Technology Security
-
-
Hussein, M.1
Raihan, M.2
Zulkernine, M.3
-
17
-
-
34548132900
-
AsmLSec: An extension of abstract state machine language for attack scenario specification
-
Vienna, Austria, IEEE CS Press
-
M. Raihan and M. Zulkernine, "AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification," In Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES'07), Vienna, Austria, IEEE CS Press, 2007, pp. 775-782.
-
(2007)
Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES'07)
, pp. 775-782
-
-
Raihan, M.1
Zulkernine, M.2
-
18
-
-
51949090977
-
Quantifying security in secure software development phases
-
Turku, Finland, IEEE CS Press
-
M.U.A. Khan and M. Zulkernine, "Quantifying Security in Secure Software Development Phases," In Proceedings of the 2nd IEEE International Workshop on Secure Software Engineering (IWSSE'08), Turku, Finland, IEEE CS Press, 2008, pp. 955-960, 2008.
-
(2008)
Proceedings of the 2nd IEEE International Workshop on Secure Software Engineering (IWSSE'08)
, vol.2008
, pp. 955-960
-
-
Khan, M.U.A.1
Zulkernine, M.2
-
19
-
-
0004229237
-
-
Doctoral Dissertation, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA
-
I.V. Krsul, "Software Vulnerability Analysis," Doctoral Dissertation, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, 1998.
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.V.1
-
20
-
-
34548131684
-
Integrating software specification into intrusion detection
-
Springer
-
M. Zulkernine, M. Graves, & M.U.A. Khan, "Integrating Software Specification into Intrusion Detection," International Journal on Information Security, Springer, 2007, vol.6, pp. 345-357.
-
(2007)
International Journal on Information Security
, vol.6
, pp. 345-357
-
-
Zulkernine, M.1
Graves, M.2
Khan, M.U.A.3
-
21
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
Sydney, Australia, IEEE CS Press
-
G. Sindre, A.L. Opdahl, "Eliciting Security Requirements by Misuse Cases," In Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS'00), Sydney, Australia, IEEE CS Press, 2000, pp. 120-131.
-
(2000)
Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS'00)
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
22
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
Pheonix, AZ, USA, IEEE CS Press
-
J. McDermott and C. Fox, "Using Abuse Case Models for Security Requirements Analysis," In Proceedings of the 15th Computer Security Applications Conference (ACSAC'99), Pheonix, AZ, USA, IEEE CS Press, 1999, pp. 55-64.
-
(1999)
Proceedings of the 15th Computer Security Applications Conference (ACSAC'99)
, pp. 55-64
-
-
McDermott, J.1
Fox, C.2
-
23
-
-
33847617890
-
Intrusion detection aware component-based system: A specification-based framework
-
Elsevier Science
-
M. Hussein and M. Zulkernine, "Intrusion Detection Aware Component-Based System: A Specification-Based Framework," Journal of System and Software, Elsevier Science, 2007, vol.80, no 5, pp. 700-710.
-
(2007)
Journal of System and Software
, vol.80
, Issue.5
, pp. 700-710
-
-
Hussein, M.1
Zulkernine, M.2
-
24
-
-
79955143136
-
SecureUML: A UML-based modeling language for model driven security
-
Dresden, Germany, Springer, LNCS 2460/2002
-
T. Lodderstedt, D.A. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model Driven Security," In Proceedings of the 5th International Conference on the Unified Modeling Language (UML'02), Dresden, Germany, Springer, 2002, LNCS 2460/2002, pp. 426-441.
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language (UML'02)
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
25
-
-
23944475544
-
When security meets software engineering: A case of modeling secure information systems
-
Elsevier Science
-
H. Mouratidis, P. Giorgini, and G. Manson, "When Security Meets Software Engineering: A Case of Modeling Secure Information Systems," Journal of Information Systems, Elsevier Science, 2005, vol.30, no.8, pp. 609-629.
-
(2005)
Journal of Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
26
-
-
0036090387
-
STATL: An Attack Language for State-Based Intrusion Detection
-
IOS Press, Amsterdam
-
S.T. Eckmann, G. Vigna, and R.A. Kemmerer, "STATL: An Attack Language for State-Based Intrusion Detection," Journal of Computer Security, IOS Press, Amsterdam, 2002, vol. 10, no. 1/2, pp. 71-104.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
27
-
-
70449635381
-
-
Last Accessed March 2009
-
Snort, www.snort.org. Last Accessed March 2009.
-
-
-
-
28
-
-
70449646465
-
-
Last Accessed March 2009
-
SecureUML Tool, http://www.foundstone.com/us/resources/proddesc /secureumltemplate.htm. Last Accessed March 2009.
-
SecureUML Tool
-
-
-
29
-
-
70449688110
-
-
Last Accessed March 2009
-
Si, http://sesa.dit.unitn.it/sistar-tool/home.php?7. Last Accessed March 2009.
-
-
-
-
30
-
-
70449639958
-
-
Last Accessed March 2009
-
Model-Driven Security with SecureUML, http://www.infsec.ethz.ch/people/ doserj/mds. Last Accessed March 2009.
-
Model-Driven Security with SecureUML
-
-
-
31
-
-
85086949764
-
Building security requirements with CLASP
-
St. Louis, MO, USA
-
J Viega, "Building Security Requirements with CLASP," In Proceedings of the 2005 International Workshop on Software Engineering for Secure Systems (SESS'05), St. Louis, MO, USA, 2005, pp. 1-7.
-
(2005)
Proceedings of the 2005 International Workshop on Software Engineering for Secure Systems (SESS'05)
, pp. 1-7
-
-
Viega, J.1
-
32
-
-
33750131444
-
-
Technical Report CMU/SEI-2005-TR-009, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA
-
N.R. Mead, E. Hough, and T. Stehney, Security Quality Requirements Engineering (SQUARE) Methodology, Technical Report CMU/SEI-2005-TR-009, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, 2005.
-
(2005)
Security Quality Requirements Engineering (SQUARE) Methodology
-
-
Mead, N.R.1
Hough, E.2
Stehney, T.3
-
33
-
-
33751416458
-
A common criteria-based security requirements engineering process for the development of secure information systems
-
Elsevier Science
-
D. Mellado, E. Fernandez-Medina, and M. Piattni, "A Common Criteria-Based Security Requirements Engineering Process for the Development of Secure Information Systems," Computer Standards and Interfaces, Elsevier Science, 2007, vol.29, pp. 244-253.
-
(2007)
Computer Standards and Interfaces
, vol.29
, pp. 244-253
-
-
Mellado, D.1
Fernandez-Medina, E.2
Piattni, M.3
|