-
1
-
-
77951751854
-
-
Build Security In 2006-08-10, accessed August
-
N. R. Mead, "Security requirements engineering", Build Security In 2006-08-10, http://buildsecurityin.us-cert.gov/daisy/bsi/articles/ bestpractices/requirements/243.html, accessed August 2007.
-
(2007)
Security Requirements Engineering
-
-
Mead, N.R.1
-
4
-
-
70749133282
-
-
SECTRA AB, http://www.sectra.com.
-
SECTRA AB
-
-
-
5
-
-
84910598342
-
Towards a structured unified process for software security
-
Shanghai, China
-
S. Ardi, D. Byers, N. Shahmehri, "Towards a structured unified process for software security", Proceedings of the ICSE 2006 workshop on Software Engineering for Secure Systems (SESS06), Shanghai, China, 2006.
-
(2006)
Proceedings of the ICSE 2006 Workshop on Software Engineering for Secure Systems (SESS06)
-
-
Ardi, S.1
Byers, D.2
Shahmehri, N.3
-
6
-
-
34547295881
-
Modeling software vulnerabilities with vulnerability cause graphs
-
Philadelphia, USA, September
-
D. Byers, S. Ardi, N. Shahmehri, C. Duma, "Modeling software vulnerabilities with vulnerability cause graphs", Proceedings of the International Conference on Software Maintenance (ICSM06), Philadelphia, USA, September 2006.
-
(2006)
Proceedings of the International Conference on Software Maintenance (ICSM06)
-
-
Byers, D.1
Ardi, S.2
Shahmehri, N.3
Duma, C.4
-
7
-
-
49049097741
-
A cause-based approach to preventing software vulnerabilities
-
Reliability and Security (ARES08), Barcelona, Spain, March
-
D. Byers, N. Shahmehri, "A cause-based approach to preventing software vulnerabilities", Proceedings of the International Conference on Availability, Reliability and Security (ARES08), Barcelona, Spain, March 2008.
-
(2008)
Proceedings of the International Conference on Availability
-
-
Byers, D.1
Shahmehri, N.2
-
9
-
-
70749136564
-
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0513.
-
-
-
-
10
-
-
70749135762
-
-
Security Target CC Evaluation Document, ver. 1.0, April
-
IBM Tivoli Access Manager for e-businnes 5.1 with Fixpack 06, Security Target CC Evaluation Document, ver. 1.0, April 2005, http://www. commoncriteriaportal.org/files/epfiles/0285b.pdf.
-
(2005)
IBM Tivoli Access Manager for e-Businnes 5.1 with Fixpack 06
-
-
-
11
-
-
70749118760
-
-
Deliverable D2.2, accessed April
-
SHIELDS project, Deliverable D2.2, http://www.shields-project.eu, accessed April 2009.
-
(2009)
SHIELDS Project
-
-
-
12
-
-
70749145723
-
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192.
-
-
-
-
13
-
-
70349673927
-
Prioritisation and selection of software security activities
-
Reliability and Security (ARES09), Fukuoka, Japan, March
-
D. Byers, N. Shahmehri, "Prioritisation and selection of software security activities", Proceedings of the International Conference on Availability, Reliability and Security (ARES09), Fukuoka, Japan, March 2009.
-
(2009)
Proceedings of the International Conference on Availability
-
-
Byers, D.1
Shahmehri, N.2
-
15
-
-
70749087037
-
-
Version 6.0f
-
CC ToolBox, Version 6.0f, http://pagenotes.com/writings/.
-
CC ToolBox
-
-
-
19
-
-
70749140107
-
-
http://www.atsec.de/01/index.php?id=03-0002-01&news=127.
-
-
-
-
20
-
-
70749148634
-
Report of the defense science board task force on mission impact of foreign influence on dod software
-
Technology and Logistics, Washington D.C., September
-
Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software, Office of the Under Secretary of Defense For Acquisition, Technology and Logistics, Washington D.C., September 2007.
-
(2007)
Office of the Under Secretary of Defense For Acquisition
-
-
|