-
1
-
-
77949482736
-
-
McGraw, G.: Software Security: Building Security In. Addison-Wesley, Reading (2006)
-
McGraw, G.: Software Security: Building Security In. Addison-Wesley, Reading (2006)
-
-
-
-
2
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
Mouratidis, H., Giorgini, P., Manson, G.: When security meets software engineering: a case of modelling secure information systems. Information Systems 30(8), 609-629 (2005)
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
3
-
-
27644580707
-
Demystifying the threat modeling process
-
Torr, P.: Demystifying the threat modeling process. IEEE Security & Privacy 3(5), 66-70 (2005)
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
, pp. 66-70
-
-
Torr, P.1
-
6
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10(1), 34-44 (2005)
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
7
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: A framework for representation and analysis. IEEE Transactions on Software Engineering 34(1), 133-153 (2008)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
8
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: IEEE International Conference on Requirements Engineering, pp. 151-161 (2003)
-
(2003)
IEEE International Conference on Requirements Engineering
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
9
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology 51(5), 916-932 (2009)
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
10
-
-
77949434059
-
A reuse-based approach to determining security requirements
-
engineering: foundation for software quality, REFSQ 2003 2003
-
Sindre, G., Firesmith, D.G., Opdahl, A.L.: A reuse-based approach to determining security requirements. In: Proceedings of the 9th international workshop on requirements engineering: foundation for software quality, REFSQ 2003 (2003)
-
Proceedings of the 9th international workshop on requirements
-
-
Sindre, G.1
Firesmith, D.G.2
Opdahl, A.L.3
-
11
-
-
84905824485
-
A comparative evaluation of three approaches to specifying security requirements
-
Engineering: foundation for Software Quality, REFSQ 2006 2006
-
Diallo, M.H., Romero-Mariona, J., Sim, S.E., Alspaugh, T.A., Richardson, D.J.: A comparative evaluation of three approaches to specifying security requirements. In: 12th Working Conference on Requirements Engineering: foundation for Software Quality, REFSQ 2006 (2006)
-
12th Working Conference on Requirements
-
-
Diallo, M.H.1
Romero-Mariona, J.2
Sim, S.E.3
Alspaugh, T.A.4
Richardson, D.J.5
-
12
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technologies
-
Davis, F.: Perceived usefulness, perceived ease of use, and user acceptance of information technologies. MIS Quarterly 13(3), 319-340 (1989)
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.1
-
13
-
-
77952356498
-
SeaMonster: Providing tool support for security modeling
-
Tapir
-
Meland, P.H., Spampinato, D.G., Hagen, E., Baadshaug, E.T., Krister, K.M., Vell, K.S.: SeaMonster: Providing tool support for security modeling. In: Norsk informasjonssikkerhetskonferanse, NISK 2008, Tapir (2008)
-
(2008)
Norsk informasjonssikkerhetskonferanse, NISK 2008
-
-
Meland, P.H.1
Spampinato, D.G.2
Hagen, E.3
Baadshaug, E.T.4
Krister, K.M.5
Vell, K.S.6
-
14
-
-
70349706054
-
An architectural foundation for security model sharing and reuse
-
IEEE Computer Society, Los Alamitos
-
Meland, P.H., Ardi, S., Jensen, J., Rios, E., Sanchez, T., Shahmehri, N., Tøndel, I.A.: An architectural foundation for security model sharing and reuse. In: Proceedings of the Fourth International Conference on Availability, Reliability and Security (ARES2009), pp. 823-828. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
Proceedings of the Fourth International Conference on Availability, Reliability and Security (ARES2009)
, pp. 823-828
-
-
Meland, P.H.1
Ardi, S.2
Jensen, J.3
Rios, E.4
Sanchez, T.5
Shahmehri, N.6
Tøndel, I.A.7
|