-
2
-
-
36849025796
-
Future directions in technology-enabled crime: 2007-09
-
Australian_Government, Editor, Australian Institute of Criminology
-
Choo, K.-K.R., R.G. Smith, and R. McCusker, Future directions in technology-enabled crime: 2007-09, in Research and Public Policy Series, Australian_Government, Editor. 2007, Australian Institute of Criminology
-
(2007)
Research and Public Policy Series
-
-
Choo, K.-K.R.1
Smith, R.G.2
McCusker, R.3
-
3
-
-
33845206869
-
Software security engineering: toward unifying software engineering and security engineering
-
Warkentin M., and Vaughn R.B. (Eds), Idea Group Publishing
-
Zulkernine M., and Ahamed S.I. Software security engineering: toward unifying software engineering and security engineering. In: Warkentin M., and Vaughn R.B. (Eds). Enterprise Information Systems Assurance and System Security (2006), Idea Group Publishing
-
(2006)
Enterprise Information Systems Assurance and System Security
-
-
Zulkernine, M.1
Ahamed, S.I.2
-
4
-
-
77950516562
-
Using Security Patterns to Model and Analyze Security Requirements
-
Monterey Bay, CA USA
-
Konrad, S., B.H.C. Chengy, L.A. Campbell, and R. Wassermann, Using Security Patterns to Model and Analyze Security Requirements, in High Assurance Systems Workshop (RHAS 03) as part of the IEEE Joint International Conference on Requirements Engineering (RE 03): Monterey Bay, CA (USA).
-
High Assurance Systems Workshop (RHAS 03) as part of the IEEE Joint International Conference on Requirements Engineering (RE 03)
-
-
Konrad, S.1
Chengy, B.H.C.2
Campbell, L.A.3
Wassermann, R.4
-
7
-
-
33646801990
-
Goal and scenario bases domain requirements analysis environment
-
Kim J., Kim M., and Park S. Goal and scenario bases domain requirements analysis environment. The Journal of Systems and Software (2005) 926-938
-
(2005)
The Journal of Systems and Software
, pp. 926-938
-
-
Kim, J.1
Kim, M.2
Park, S.3
-
8
-
-
0003499649
-
Requirements engineering process and techniques
-
John Willey & Sons, UK
-
Kotonya G., and Sommerville I. Requirements engineering process and techniques. Hardcover ed. 294 (1998), John Willey & Sons, UK
-
(1998)
Hardcover ed.
, vol.294
-
-
Kotonya, G.1
Sommerville, I.2
-
10
-
-
84898245139
-
Security engineering: it is all about control and assurance objectives
-
Warkentin M., and Vaughn R.B. (Eds), Idea Group Publishing
-
Henning R.R., and Corporation H. Security engineering: it is all about control and assurance objectives. In: Warkentin M., and Vaughn R.B. (Eds). Enterprise Information Systems Assurance and System Security (2006), Idea Group Publishing
-
(2006)
Enterprise Information Systems Assurance and System Security
-
-
Henning, R.R.1
Corporation, H.2
-
13
-
-
12344314483
-
A framework for security requirements engineering
-
Department of Computer Science, University of York
-
Moffett J.D., and Nuseibeh B.A. A framework for security requirements engineering. Report YCS (2003), Department of Computer Science, University of York 368
-
(2003)
Report YCS
, pp. 368
-
-
Moffett, J.D.1
Nuseibeh, B.A.2
-
15
-
-
33847286844
-
Lessons from applying the systematic literature review process within the software engineering domain
-
Brereton P., Kitchenham B., Budgen D., Turner M., and Khalil M. Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Software 80 4 (2007) 571-583
-
(2007)
J. Syst. Software
, vol.80
, Issue.4
, pp. 571-583
-
-
Brereton, P.1
Kitchenham, B.2
Budgen, D.3
Turner, M.4
Khalil, M.5
-
16
-
-
44649122227
-
Guideline for performing Systematic Literature Reviews in Software Engineering. Version 2.3
-
University of Keele (Software Engineering Group, School of Computer Science and Mathematics) and Durham Department of Computer Science
-
Kitchenham, B., Guideline for performing Systematic Literature Reviews in Software Engineering. Version 2.3. 2007, University of Keele (Software Engineering Group, School of Computer Science and Mathematics) and Durham (Department of Computer Science).
-
(2007)
-
-
Kitchenham, B.1
-
18
-
-
2942757657
-
Engineering security requirements
-
Firesmith D.G. Engineering security requirements. Journal of Object Technology 2 1 (2003) 53-68
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.G.1
-
20
-
-
33745471209
-
Model driven security: from UML models to access control infrastructures
-
Basin D., Doser J., and Lodderstedt T. Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15 1 (2006) 39-91
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
21
-
-
3142750497
-
Tropos: agent-oriented software development methodology
-
Bresciani P., Giorgini P., Giunchiglia F., Mylopoulos J., and Perini A. Tropos: agent-oriented software development methodology. Journal of Autonomous Agents and Multi-Agent System (2004) 203-236
-
(2004)
Journal of Autonomous Agents and Multi-Agent System
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
22
-
-
35048841167
-
-
Giorgini P., Massacci F., Mylopoulos J., and Zannone N. Requirements engineering meets trust management: model, methodology, and reasoning. iTrust 2004 (2004) 176-190
-
(2004)
Requirements engineering meets trust management: model, methodology, and reasoning. iTrust 2004
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
24
-
-
57049189719
-
-
Springer, Barcelona, Spain
-
Ali R., Dalpiaz F., and Giorgini P. Location-based software modeling and analysis: Tropos-based approach, in 27th International Conference on Conceptual Modeling (ER 08) (2008), Springer, Barcelona, Spain
-
(2008)
Location-based software modeling and analysis: Tropos-based approach, in 27th International Conference on Conceptual Modeling (ER 08)
-
-
Ali, R.1
Dalpiaz, F.2
Giorgini, P.3
-
25
-
-
77950517679
-
-
Springer, Amsterdam, The Netherlands
-
Ali R., Dalpiaz F., and Giorgini P. A goal modeling framework for self-contextualizable software, in 14th international conference on exploring modeling methods in systems analysis and design (EMMSAD09) (2009), Springer, Amsterdam, The Netherlands
-
(2009)
A goal modeling framework for self-contextualizable software, in 14th international conference on exploring modeling methods in systems analysis and design (EMMSAD09)
-
-
Ali, R.1
Dalpiaz, F.2
Giorgini, P.3
-
28
-
-
58849148475
-
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
-
Compagna L., Khoury P.E., Krausová A., Massacci F., and Zannone N. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17 1 (2009) 1-30
-
(2009)
Artif. Intell. Law
, vol.17
, Issue.1
, pp. 1-30
-
-
Compagna, L.1
Khoury, P.E.2
Krausová, A.3
Massacci, F.4
Zannone, N.5
-
29
-
-
33244481982
-
-
ACM Press, St. Louis, MO, USA
-
Firesmith D.G. Engineering safety-related requirements for software-intensive systems, in Proceedings of the 27th international conference on Software engineering (2005), ACM Press, St. Louis, MO, USA
-
(2005)
Engineering safety-related requirements for software-intensive systems, in Proceedings of the 27th international conference on Software engineering
-
-
Firesmith, D.G.1
-
30
-
-
77950517764
-
Engineering safety and security related requirements for software intensive systems, in international conference on software engineering
-
Firesmith D.G. Engineering safety and security related requirements for software intensive systems, in international conference on software engineering. IEEE Computer Society (2007) 169
-
(2007)
IEEE Computer Society
, pp. 169
-
-
Firesmith, D.G.1
-
31
-
-
33847617890
-
Intrusion detection aware component-based systems: a specification-based framework
-
Hussein M., and Zulkernine M. Intrusion detection aware component-based systems: a specification-based framework. J. Syst. Softw. 80 5 (2007) 700-710
-
(2007)
J. Syst. Softw.
, vol.80
, Issue.5
, pp. 700-710
-
-
Hussein, M.1
Zulkernine, M.2
-
34
-
-
77950516101
-
-
ACM Press, Shanghai, China
-
Lee S.-W., Gandhi R., Muthurajan D., Yavagal D., and Ahn G.-J. Building problem domain ontology from security requirements in regulatory documents, in Proceedings of the 2006 international workshop on Software engineering for secure systems (2006), ACM Press, Shanghai, China
-
(2006)
Building problem domain ontology from security requirements in regulatory documents, in Proceedings of the 2006 international workshop on Software engineering for secure systems
-
-
Lee, S.-W.1
Gandhi, R.2
Muthurajan, D.3
Yavagal, D.4
Ahn, G.-J.5
-
37
-
-
77950516100
-
Integrating privacy requirements into security requirements engineering
-
Abu-Nimeh S., Miyazaki S., and Mead N.R. Integrating privacy requirements into security requirements engineering. SEKE (2009) 542-547
-
(2009)
SEKE
, pp. 542-547
-
-
Abu-Nimeh, S.1
Miyazaki, S.2
Mead, N.R.3
-
38
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
Mellado D., Fernández-Medina E., and Piattini M. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards and Interfaces (2007) 244-253
-
(2007)
Computer Standards and Interfaces
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
39
-
-
44949241673
-
Towards security requirements management for software product lines: a security domain requirements engineering process
-
Mellado D., Fernández-Medina E., and Piattini M. Towards security requirements management for software product lines: a security domain requirements engineering process. Computer Standards & Interfaces (2008) 361-371
-
(2008)
Computer Standards & Interfaces
, pp. 361-371
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
40
-
-
40449096402
-
Security requirements engineering: a framework for representation and analysis
-
Haley C.B., Laney R., Moffet J.D., and Nuseibeh B. Security requirements engineering: a framework for representation and analysis. IEEE Trans. Software Eng. 34 1 (2008) 133-153
-
(2008)
IEEE Trans. Software Eng.
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.2
Moffet, J.D.3
Nuseibeh, B.4
-
41
-
-
33745886231
-
A security requirement management database based on ISO/IEC 15408
-
Morimoto S., Horie D., and Cheng J. A security requirement management database based on ISO/IEC 15408. ICCSA 2006 (LNCS 3982) 3 (2006) 1-10
-
(2006)
ICCSA 2006 (LNCS 3982)
, vol.3
, pp. 1-10
-
-
Morimoto, S.1
Horie, D.2
Cheng, J.3
-
42
-
-
49049108174
-
-
ARES
-
Horie D., Morimoto S., Azimah N., Goto Y., and Cheng J. ISEDS: an information security engineering database system based on ISO Standards (2008), ARES 1219-1225
-
(2008)
ISEDS: an information security engineering database system based on ISO Standards
, pp. 1219-1225
-
-
Horie, D.1
Morimoto, S.2
Azimah, N.3
Goto, Y.4
Cheng, J.5
-
46
-
-
79955163100
-
UMLsec: extending UML for secure systems development. UML
-
Jürjens J. UMLsec: extending UML for secure systems development. UML. The Unified Modeling Language. Model Engineering, Languages,Concepts, and Tools. 5th International Conference., 2002. LNCS 2460 (2002) 412-425
-
(2002)
The Unified Modeling Language. Model Engineering, Languages,Concepts, and Tools. 5th International Conference., 2002. LNCS 2460
, pp. 412-425
-
-
Jürjens, J.1
-
48
-
-
33947608669
-
Software requirements and architecture modeling for evolving non-secure applications into secure applications
-
Shin M.E., and Gomaa H. Software requirements and architecture modeling for evolving non-secure applications into secure applications. Sci. Comput. Program. 66 1 (2007) 60-70
-
(2007)
Sci. Comput. Program.
, vol.66
, Issue.1
, pp. 60-70
-
-
Shin, M.E.1
Gomaa, H.2
-
49
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G., and Opdahl A.L. Eliciting security requirements with misuse cases. Requirements Eng. 10 1 (2005) 34-44
-
(2005)
Requirements Eng.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
51
-
-
77950516828
-
Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology
-
Opdahl, A.L. and G. Sindre, Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology. In Press, Corrected Proof, 2008.
-
(2008)
Press, Corrected Proof
-
-
Opdahl, A.L.1
Sindre, G.2
-
53
-
-
17844409254
-
Requirements reuse for improving information systems security: a practitioner's approach
-
Toval A., Nicolás J., Moros B., and García F. Requirements reuse for improving information systems security: a practitioner's approach. Requirements Engineering Journal (2001) 205-219
-
(2001)
Requirements Engineering Journal
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
-
55
-
-
77950518310
-
-
LSO
-
Nicolás J., Lasheras J., Toval A., Ortíz F., and Alvarez B. A collaborative learning experience in modelling the requirements of teleoperated systems for ship hull maintenance, in workshop on learning software organizations and requirements engineering (2006), LSO
-
(2006)
A collaborative learning experience in modelling the requirements of teleoperated systems for ship hull maintenance, in workshop on learning software organizations and requirements engineering
-
-
Nicolás, J.1
Lasheras, J.2
Toval, A.3
Ortíz, F.4
Alvarez, B.5
-
62
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
Zuccato A. Holistic security requirement engineering for electronic commerce. Computers and Security (2004) 63-76
-
(2004)
Computers and Security
, pp. 63-76
-
-
Zuccato, A.1
-
63
-
-
34248396442
-
Holistic security management framework applied in electronic commerce
-
Zuccato A. Holistic security management framework applied in electronic commerce. Computer & Security 26 3 (2007) 256-265
-
(2007)
Computer & Security
, vol.26
, Issue.3
, pp. 256-265
-
-
Zuccato, A.1
-
65
-
-
69549136179
-
Engineering requirements for system reliability and security, in software system reliability and security
-
Broy M., Grunbauer J., and Hoare C.A.R. (Eds), IOS Press
-
Lamsweerde V. Engineering requirements for system reliability and security, in software system reliability and security. In: Broy M., Grunbauer J., and Hoare C.A.R. (Eds). NATO security through science series-D: information and communication security (2007), IOS Press 196-238
-
(2007)
NATO security through science series-D: information and communication security
, pp. 196-238
-
-
Lamsweerde, V.1
-
67
-
-
34548787238
-
Model-based security engineering of distributed information systems using UMLSec
-
Best B., Jürjens J., and Nuseibeh B. Model-based security engineering of distributed information systems using UMLSec. ICSE (2007) 581-590
-
(2007)
ICSE
, pp. 581-590
-
-
Best, B.1
Jürjens, J.2
Nuseibeh, B.3
-
75
-
-
56649104987
-
A formal metamodel for problem frames
-
11th international conference on Model Driven Engineering Languages and Systems (ARES'08)
-
Hatebur D., Heisel M., and Schmidt H. A formal metamodel for problem frames. 11th international conference on Model Driven Engineering Languages and Systems (ARES'08). Lecture Notes In Computer Science Vol. 5301 (2008) 68-82
-
(2008)
Lecture Notes In Computer Science
, vol.5301
, pp. 68-82
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
|