-
4
-
-
47949103186
-
-
Munich, Germany
-
Damian D, Izquierdo L, Singer J, Kwan I (2007) Awareness in the wild: why communication breakdowns occur. In: Proceedings of second international conference on global software engineering. Munich, Germany, pp 81-90
-
(2007)
Awareness In the Wild: Why Communication Breakdowns Occur
, pp. 81-90
-
-
Damian, D.1
Izquierdo, L.2
Singer, J.3
Kwan, I.4
-
5
-
-
77950516008
-
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007
-
-
-
-
6
-
-
77950520686
-
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 1; General Model, CCMB-2007-09-001, September 2007
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 1; General Model, CCMB-2007-09-001, September 2007
-
-
-
-
8
-
-
77950516363
-
-
Department of Defense (1985) DoD 5200.28-STD: trusted computer system evaluation criteria. (August 15)
-
Department of Defense (1985) DoD 5200.28-STD: trusted computer system evaluation criteria. (August 15)
-
-
-
-
9
-
-
77950521081
-
-
Government of Canada (1993) The Canadian trusted computer product evaluation criteria (January)
-
Government of Canada (1993) The Canadian trusted computer product evaluation criteria (January)
-
-
-
-
11
-
-
77950518705
-
-
Common Methodology for Information Technology Security Evaluation, Evaluation methodology, Version 3.2, Revision 2, CCMB-2009-09-004, September 2007
-
Common Methodology for Information Technology Security Evaluation, Evaluation methodology, Version 3.2, Revision 2, CCMB-2009-09-004, September 2007
-
-
-
-
12
-
-
77950519586
-
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 2; security functional components, CCMB-2007-09-002, September 2007
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 2; security functional components, CCMB-2007-09-002, September 2007
-
-
-
-
13
-
-
77950515903
-
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 3; security assurance components, CCMB-2007-09-003, September 2007
-
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2: part 3; security assurance components, CCMB-2007-09-003, September 2007
-
-
-
-
14
-
-
77950518236
-
-
ISO 15408:2007 (2007) Common Criteria for information technology security evaluation: evaluation methodology, version 3.1, revision 2, CCMB-2007-09-004 (September)
-
ISO 15408:2007 (2007) Common Criteria for information technology security evaluation: evaluation methodology, version 3.1, revision 2, CCMB-2007-09-004 (September)
-
-
-
-
15
-
-
84885378180
-
Innovations in natural language document processing for requirements engineering
-
In: Paech B, Martell C, Lecture notes in computer science. Springer, Berlin
-
Berzins V, Martell LC, Adams P (2007) Innovations in natural language document processing for requirements engineering. In: Paech B, Martell C (eds) Innovations for requirement analysis. From stakeholders' needs to formal designs: 14th monterey workshop 2007. Lecture notes in computer science. Springer, Berlin, pp 125-146
-
(2007)
Innovations For Requirement Analysis. From Stakeholders' Needs to Formal Designs: 14th Monterey Workshop 2007
, pp. 125-146
-
-
Berzins, V.1
Martell, L.C.2
Adams, P.3
-
17
-
-
0028448779
-
Domain-oriented design environments
-
Fischer G (1994) Domain-oriented design environments. Auto-mat Softw Eng 1:177-203
-
(1994)
Auto-mat Softw Eng
, vol.1
, pp. 177-203
-
-
Fischer, G.1
-
19
-
-
0032178701
-
Seeding, evolutionary growth and reseeding: Constructing, capturing and evolving knowledge in domainoriented design environments
-
Fischer G (1998) Seeding, evolutionary growth and reseeding: constructing, capturing and evolving knowledge in domainoriented design environments. Automat Softw Eng 5:447-464
-
(1998)
Automat Softw Eng
, vol.5
, pp. 447-464
-
-
Fischer, G.1
-
20
-
-
77950519990
-
Managing requirement engineering processes by adapted quality gateways and critique-based RE-tools
-
Palma de Mallorca, Spain, (November, in conjunction with the IWSM-Mensura Conference)
-
Knauss E, Flohr T (2007) Managing requirement engineering processes by adapted quality gateways and critique-based RE-tools. In: Proceedings of workshop on measuring requirements for project and product success. Palma de Mallorca, Spain (November, in conjunction with the IWSM-Mensura Conference)
-
(2007)
Proceedings of Workshop On Measuring Requirements For Project and Product Success
-
-
Knauss, E.1
Flohr, T.2
-
26
-
-
20444440807
-
Sound development of secure service-based systems
-
In: Marco A, Aoyama M, Curbera F, Papazoglou MP, ACM
-
Deubler M, Grunbauer J, Jurjens J, Wimmel G (2004) Sound development of secure service-based systems. In: Marco A, Aoyama M, Curbera F, Papazoglou MP (eds) Proceedings of the 2nd international conference on service oriented computing(IC-SOC). ACM, pp 115-124
-
(2004)
Proceedings of The 2nd International Conference On Service Oriented Computing(IC-SOC)
, pp. 115-124
-
-
Deubler, M.1
Grunbauer, J.2
Jurjens, J.3
Wimmel, G.4
-
28
-
-
0036037169
-
Using UMLsec and goal-trees for secure systems development
-
In: Lamont GB, Haddad H, Papadopoulos G, Panda B, ACM Press
-
Jurjens J (2002) Using UMLsec and goal-trees for secure systems development. In: Lamont GB, Haddad H, Papadopoulos G, Panda B (eds) Proceedings of the 2002 symposium of applied computing (SAC). ACM Press, pp 1026-1031
-
(2002)
Proceedings of The 2002 Symposium of Applied Computing (SAC)
, pp. 1026-1031
-
-
Jurjens, J.1
-
29
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng J 10(1):34-44
-
(2005)
Requir Eng J
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
31
-
-
67349213219
-
Integrating security and systems engineering: Towards the modelling of secure information systems
-
In: Eder J, Missikoff M, Springer
-
Mouratidis H, Giorgini P, Manson GA (2005) Integrating security and systems engineering: towards the modelling of secure information systems. In: Eder J, Missikoff M (eds) 15th International conference on advanced information systems engineering (CAiSE 2003), vol 2681 of lecture notes in computer science. Springer, pp 63-78
-
(2005)
15th International Conference On Advanced Information Systems Engineering (CAiSE 2003), Vol 2681 of Lecture Notes In Computer Science
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
33
-
-
33746038490
-
Towards a comprehensive framework for secure systems development
-
In: Dubois E, Pohl K (eds), Springer, Luxembourg
-
Mouratidis H, Jurjens J, Fox J (2006) Towards a comprehensive framework for secure systems development. In: Dubois E, Pohl K (eds) CAiSE, vol 4001 of lecture notes in computer science. Springer, Luxembourg, pp 48-62
-
(2006)
CAiSE, Vol 4001 of Lecture Notes In Computer Science
, pp. 48-62
-
-
Mouratidis, H.1
Jurjens, J.2
Fox, J.3
-
37
-
-
77950519810
-
-
UMLsec tool, 2001-08
-
UMLsec tool, 2001-08. http://www.umlsec.de/url/e-link
-
-
-
-
38
-
-
77950518513
-
-
TISPAN, ETSI (2006) Telecommunications and internet converged services and protocols for advanced networking (TI-SPAN): methods and protocols; part 1: method and proforma for threat, risk, vulnerability analysis. Technical report ETSI TS 102 165-1 V4.2.1, European Telecommunications Standards Institute
-
TISPAN, ETSI (2006) Telecommunications and internet converged services and protocols for advanced networking (TI-SPAN): methods and protocols; part 1: method and proforma for threat, risk, vulnerability analysis. Technical report ETSI TS 102 165-1 V4.2.1, European Telecommunications Standards Institute
-
-
-
-
39
-
-
34548176819
-
eTVRA, a threat, vulnerability and risk assessment method and tool for eEurope
-
IEEE Computer Society
-
Rossebø JE, Cadzow S, Sijben P (2007) eTVRA, a threat, vulnerability and risk assessment method and tool for eEurope. In: ARES'07: proceedings of the the second international conference on availability, reliability and security. IEEE Computer Society, pp 925-933
-
(2007)
ARES'07: Proceedings of the the second international conference on availability, reliability and security
, pp. 925-933
-
-
Rossebø, J.E.1
Cadzow, S.2
Sijben, P.3
-
42
-
-
35148889088
-
Improving an industrial reference process by information flow analysis: A case study
-
Riga, Latvia. Springer, Berlin
-
Stapel K, Schneider K, Lubke D, Flohr T (2007) Improving an industrial reference process by information flow analysis: a case study. In: Proceedings of PROFES 2007, vol 4589 of LNCS. Riga, Latvia. Springer, Berlin, pp 147-159
-
(2007)
Proceedings of PROFES 2007, Vol 4589 of LNCS
, pp. 147-159
-
-
Stapel, K.1
Schneider, K.2
Lubke, D.3
Flohr, T.4
-
43
-
-
77950517326
-
The requirements engineering gap in the OEM-supplier relationship
-
Allmann C, Winkler L, Kolzow T (2006) The requirements engineering gap in the OEM-supplier relationship. J Univers Knowl Manage 1(2):103-111
-
(2006)
J Univers Knowl Manage
, vol.1
, Issue.2
, pp. 103-111
-
-
Allmann, C.1
Winkler, L.2
Kolzow, T.3
-
44
-
-
82955200126
-
Lightweight process documentation: Just enough structure in automotive pre-development
-
In: O'Connor Rory V, Baddoo N, Smolander K, Mes-snarz R, Dublin, Ireland, 9. Springer
-
Stapel K, Knauss E, Allmann C (2008) Lightweight process documentation: just enough structure in automotive pre-development. In: O'Connor Rory V, Baddoo N, Smolander K, Mes-snarz R (eds) Proceedings of the 15th European conference, EuroSPI, communications in computer and information science. Dublin, Ireland, 9. Springer, pp 142-151
-
(2008)
Proceedings of The 15th European Conference, EuroSPI, Communications In Computer and Information Science
, pp. 142-151
-
-
Stapel, K.1
Knauss, E.2
Allmann, C.3
-
46
-
-
84960340124
-
The linguistic approach to the natural language requirements quality: Benefit of the use of an automatic tool
-
IEEE Computer Society, Washington, DC
-
Fabbrini F, Fusani M, Gnesi S, Lami G (2001) The linguistic approach to the natural language requirements quality: benefit of the use of an automatic tool. In: SEW'01: proceedings of the 26th annual NASA goddard software engineering workshop. IEEE Computer Society, Washington, DC, p 97
-
(2001)
SEW'01: Proceedings of The 26th Annual NASA Goddard Software Engineering Workshop
, pp. 97
-
-
Fabbrini, F.1
Fusani, M.2
Gnesi, S.3
Lami, G.4
-
50
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5-20
-
(2008)
IEEE Trans Softw Eng
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
51
-
-
33750050331
-
-
Wiley, London
-
Schumacher M, Buglioni EF, Hybertson D, Buschmann F, Sommerlad P (2006) Security patterns: integrating security and systems engineering. Wiley, London
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Buglioni, E.F.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
52
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
Toval A, Nicolás J, Morosa B, García F (2002) Requirements reuse for improving information systems security: a practitioner's approach. Requir Eng J 6:205-219
-
(2002)
Requir Eng J
, vol.6
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Morosa, B.3
García, F.4
-
54
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley CB, Laney RC, Moffett JD, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans Softw Eng 34(1):133-153
-
(2008)
IEEE Trans Softw Eng
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
55
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
-
In: Song I-Y, Liddle SW, Ling TW, Scheuermann P (eds), Springer
-
Giorgini P, Massacci F, Mylopoulos J (2003) Requirement engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard. In: Song I-Y, Liddle SW, Ling TW, Scheuermann P (eds) 22nd International conference on conceptual modeling (ER 2003), vol 2813 of lecture notes in computer science. Springer, pp 263-276
-
(2003)
22nd International Conference On Conceptual Modeling (ER 2003), Vol 2813 of Lecture Notes In Computer Science
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
56
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
IEEE Computer Society
-
Giorgini P, Massacci F, Mylopoulos J, Zannone N (2005) Modeling security requirements through ownership, permission and delegation. In: Proceedings of the 13th IEEE international conference on requirements engineering. IEEE Computer Society, pp 167-176
-
(2005)
Proceedings of The 13th IEEE International Conference On Requirements Engineering
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
57
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information system
-
Mellado D, Medinav, Piattini M (2007) A common criteria based security requirements engineering process for the development of secure information system. Comput Stand Interfaces 29:244-253
-
(2007)
Comput Stand Interfaces
, vol.29
, pp. 244-253
-
-
Mellado, D.1
Medinav Piattini, M.2
-
58
-
-
33751189883
-
Security quality requirements engineering (square) methodology
-
Mead NR, Steheny T (2005) Security quality requirements engineering (square) methodology. SIGSOFT Softw Eng Notes 30(4):1-7
-
(2005)
SIGSOFT Softw Eng Notes
, vol.30
, Issue.4
, pp. 1-7
-
-
Mead, N.R.1
Steheny, T.2
-
59
-
-
77950520078
-
-
ISO/IEC 27001:2005 (2005) Specification for information security management (October)
-
ISO/IEC 27001:2005 (2005) Specification for information security management (October)
-
-
-
-
60
-
-
79959760833
-
Security requirements addressing security risks for improving software quality
-
Technical report TUM-I0811, Technische Universitat Munchen, Munich, Germany Requirements Eng (2010)
-
Islam S, Dong W (2008) Security requirements addressing security risks for improving software quality. In: Workshop-band software-Qualitatsmodellierung und-bewertung (SQMB'08), Technical report TUM-I0811, Technische Universitat Munchen, Munich, Germany Requirements Eng (2010) 15:63-93
-
(2008)
Workshop-band Software-Qualitatsmodellierung Und-bewertung (SQMB'08)
, vol.15
, pp. 63-93
-
-
Islam, S.1
Dong, W.2
-
63
-
-
49049094658
-
Transforming security requirements into architecture
-
Yskout K, Scandariato R, Win BD, Joosen W (2008) Transforming security requirements into architecture. In: International conference on availability, reliability and security. pp 1421-1428
-
(2008)
In: International Conference On Availability, Reliability and Security
, pp. 1421-1428
-
-
Yskout, K.1
Scandariato, R.2
Win, B.D.3
Joosen, W.4
-
64
-
-
49049111838
-
Modelling security properties in a grid-based operating system with anti-goals
-
Arenas A, Aziz B, Bicarregui J, Matthews B, Yang EY (2008) Modelling security properties in a grid-based operating system with anti-goals. In: Proceedings of the 2008 third international conference on availability, reliability and security (ARES). pp 1429-1436
-
(2008)
Proceedings of The 2008 Third International Conference On Availability, Reliability and Security (ARES)
, pp. 1429-1436
-
-
Arenas, A.1
Aziz, B.2
Bicarregui, J.3
Matthews, B.4
Yang, E.Y.5
-
65
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
Springer
-
Elahi G, Yu E (2007) A goal oriented approach for modeling and analyzing security trade-offs. In: ER 2007, vol 4801 of lecture notes in computer science. Springer, pp 375-390
-
(2007)
ER 2007, Vol 4801 of Lecture Notes In Computer Science
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
66
-
-
84931024051
-
Integrating security and usability into the requirements and design process
-
Flechais I, Mascolo C, Sasse MA (2007) Integrating security and usability into the requirements and design process. Int J Electron Secur Digit Forensics 1(1):12-26
-
(2007)
Int J Electron Secur Digit Forensics
, vol.1
, Issue.1
, pp. 12-26
-
-
Flechais, I.1
Mascolo, C.2
Sasse, M.A.3
-
67
-
-
33845216895
-
A model based approach to trust, security and assurance
-
Baldwin A, Beres Y, Shiu S, Kearney P (2006) A model based approach to trust, security and assurance. BT Technol J 24(4):53-68
-
(2006)
BT Technol J
, vol.24
, Issue.4
, pp. 53-68
-
-
Baldwin, A.1
Beres, Y.2
Shiu, S.3
Kearney, P.4
-
68
-
-
33947420435
-
A risk-driven security analysis method and modelling language
-
January
-
Kearney P, Brugger L (2007) A risk-driven security analysis method and modelling language. BT Technol J 25(1) January
-
(2007)
BT Technol J
, vol.25
, Issue.1
-
-
Kearney, P.1
Brugger, L.2
-
69
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
Ray I, France RB, Li Na, Georg G (2004) An aspect-based approach to modeling access control concerns. Inf Softw Technol 46(9):575-587
-
(2004)
Inf Softw Technol
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.B.2
Li, N.3
Georg, G.4
-
70
-
-
27144534308
-
Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development
-
IEEE Computer Society
-
Houmb SH, Georg G, France RB, Bieman JM, Jurjens J (2005) Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development. In: Proceedings of the 10th IEEE international conference on engineering of complex computer systems. IEEE Computer Society, pp 195-204
-
(2005)
In: Proceedings of The 10th IEEE International Conference On Engineering of Complex Computer Systems
, pp. 195-204
-
-
Houmb, S.H.1
Georg, G.2
France, R.B.3
Bieman, J.M.4
Jurjens, J.5
-
71
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin DA, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1):39-91
-
(2006)
ACM Trans Softw Eng Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.A.1
Doser, J.2
Lodderstedt, T.3
-
73
-
-
73149094681
-
Modeling and enforcing advanced access control policies in healthcare systems with SECTET
-
In: Sztipanovits J, Breu R, Ammenwerth E, Bajcsy R, Mitchell JC, Pretschner A (eds), (MOTHIS@Models
-
Alam M, Hafner M, Memon M, Hung P (2007) Modeling and enforcing advanced access control policies in healthcare systems with SECTET. In: Sztipanovits J, Breu R, Ammenwerth E, Bajcsy R, Mitchell JC, Pretschner A (eds) Workshop on model-based trustworthy health information systems (MOTHIS@Models)
-
(2007)
Workshop On Model-based Trustworthy Health Information Systems
-
-
Alam, M.1
Hafner, M.2
Memon, M.3
Hung, P.4
-
74
-
-
55049109759
-
Model-driven security engineering for trust management in SECTET
-
Alam M, Hafner M, Breu R (2007) Model-driven security engineering for trust management in SECTET. J Softw 2(1):47-59
-
(2007)
J Softw
, vol.2
, Issue.1
, pp. 47-59
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
75
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
Breu R, Burger K, Hafner M, Jurjens J, Popp G, Wimmel G, Lotz V (2003) Key issues of a formally based process model for security engineering. In: 16th International conference Software & Systems Engineering & their Applications (ICSSEA 2003)
-
(2003)
16th International Conference Software & Systems Engineering & their Applications (ICSSEA 2003)
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jurjens, J.4
Popp, G.5
Wimmel, G.6
Lotz, V.7
-
76
-
-
35348959376
-
Tools for secure systems development with UML
-
(October 2007. Invited submission to the special issue for, FASE 2004/05)
-
Jurjens J, Shabalin P (2007) Tools for secure systems development with UML. Int J Softw Tools Technol Transf 9(5-6):527-544 (October 2007. Invited submission to the special issue for FASE 2004/05)
-
(2007)
Int J Softw Tools Technol Transf
, vol.9
, Issue.5-6
, pp. 527-544
-
-
Jurjens, J.1
Shabalin, P.2
-
78
-
-
55049118116
-
Model-based security analysis of the german health card architecture
-
(special section on model-based development of trustworthy health information systems)
-
Jurjens J, Rumm R (2008) Model-based security analysis of the german health card architecture. Methods Inf Med 47(5):409-416 (special section on model-based development of trustworthy health information systems)
-
(2008)
Methods Inf Med
, vol.47
, Issue.5
, pp. 409-416
-
-
Jurjens, J.1
Rumm, R.2
|