-
8
-
-
55249114157
-
-
C.Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France,James M.Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1): 56-74 (2009).
-
C.Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France,James M.Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1): 56-74 (2009).
-
-
-
-
11
-
-
21644480889
-
-
Steve Lipner, The Trustworthy Computing Security Development Lifecycle, ACSAC, pp.2-13, 20th Annual Computer Security Applications Conference (ACSAC'04), 2004.
-
Steve Lipner, "The Trustworthy Computing Security Development Lifecycle," ACSAC, pp.2-13, 20th Annual Computer Security Applications Conference (ACSAC'04), 2004.
-
-
-
-
13
-
-
73849129048
-
-
Vineet Saini, Qiang Duan and Vamsi Paruchuri, Threat Modeling Using Attack Trees, Proceedings of the Sixth Annual CCSC Mid-South Conference and Journal of Computing Sciences in Colleges, 23, Issue 4, April 2008.
-
Vineet Saini, Qiang Duan and Vamsi Paruchuri, "Threat Modeling Using Attack Trees", Proceedings of the Sixth Annual CCSC Mid-South Conference and Journal of Computing Sciences in Colleges, Volume 23, Issue 4, April 2008.
-
-
-
-
14
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
G.Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases", Requirements Engineering, 10(1):34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
15
-
-
0037299044
-
Misuse cases help to elicit non-functional equirements
-
I. Alexander, "Misuse cases help to elicit non-functional equirements", Computing and Control Engineering Journal, 14(1):40-45, 2003.
-
(2003)
Computing and Control Engineering Journal
, vol.14
, Issue.1
, pp. 40-45
-
-
Alexander, I.1
-
16
-
-
2342563769
-
Considering Defense in Depth for Software Applications
-
IEEE Security and Privacy, January
-
Martin R. Stylz and James A> Whittaker, ""Considering Defense in Depth for Software Applications", IEEE Security and Privacy, January 2004..
-
(2004)
-
-
Martin, R.1
-
17
-
-
66249134919
-
-
Kevin Dauch, Adam Hovak, Roger Nestler, Information Assurance Using a Defense In-Depth Strategy, catch, pp.267-272, Cybersecurity Applications & Technology Conference for Homeland Security, 2009
-
Kevin Dauch, Adam Hovak, Roger Nestler, , "Information Assurance Using a Defense In-Depth Strategy," catch, pp.267-272, Cybersecurity Applications & Technology Conference for Homeland Security, 2009
-
-
-
-
18
-
-
33846293675
-
Generating Policies for Defense in Depth
-
P.Rubel, M.Ihde, S. Harp, C.Payne, "Generating Policies for Defense in Depth", Proceedings of the 21st Annual Computer Security Applications Conference ACSAC 2005, pp: 505-514.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference ACSAC
, pp. 505-514
-
-
Rubel, P.1
Ihde, M.2
Harp, S.3
Payne, C.4
-
22
-
-
45849117958
-
Alignment of Misuse Cases with Security Risk Management
-
published in The, IEEE
-
Raimundas Matulevicius, Nicolas Mayer and Patrick Heymans, "Alignment of Misuse Cases with Security Risk Management", published in The Third International conference on Availability, Reliability and Security , IEEE 2008, pp: 1397-1404..
-
(2008)
Third International conference on Availability, Reliability and Security
, pp. 1397-1404
-
-
Matulevicius, R.1
Mayer, N.2
Heymans, P.3
-
23
-
-
0031074051
-
-
M.Wooldridge, Agent Based Software Engineering, IEE Proceedings, Software Engineering, January 1997, 144, Issue 1, pp. 26-37
-
M.Wooldridge, "Agent Based Software Engineering", IEE Proceedings, Software Engineering, January 1997, Volume 144, Issue 1, pp. 26-37
-
-
-
-
24
-
-
0001468432
-
Agent Oriented Software Engineering
-
M.Wooldridge and P.Ciancarini, "Agent Oriented Software Engineering", AOSE 2000, pp: 1-28.
-
(2000)
AOSE
, pp. 1-28
-
-
Wooldridge, M.1
Ciancarini, P.2
-
25
-
-
73849112823
-
-
Man-in-the-Middle Attacks, Copyright 2009 Entrust.
-
Man-in-the-Middle Attacks, Copyright 2009 Entrust.
-
-
-
|