-
3
-
-
77950519774
-
-
National Vulnerability Database
-
National Vulnerability Database. http://www.nvd.nist.gov/
-
-
-
-
4
-
-
77950518515
-
-
SANS
-
SANS. http://www.sans.org/
-
-
-
-
5
-
-
77950517600
-
-
Common Weakness Enumeration
-
Common Weakness Enumeration. http://www.cwe.mitre.org/
-
-
-
-
6
-
-
77950521021
-
-
Common Vulnerability Scoring System
-
Common Vulnerability Scoring System. http://www.first.org/cvss/
-
-
-
-
9
-
-
33749035450
-
Requirements engineering for trust management: Model, methodology, and reasoning
-
Giorgini P, Massacci F, Mylopoulos J, Zannone N (2006) Requirements engineering for trust management: model, methodology, and reasoning. Int J Inf Secur 5(4):257-274
-
(2006)
Int J Inf Secur
, vol.5
, Issue.4
, pp. 257-274
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
10
-
-
0002670359
-
Attack Trees
-
Schneier B (1999) Attack trees. Dr. Dobb's J 24(12):21-29
-
(1999)
Dr. Dobb's J
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
11
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng 10(1):34-44
-
(2005)
Requir Eng
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
13
-
-
49049105211
-
Risk as dependability metrics for the evaluation of business solutions: A model-driven approach
-
IEEE Computer Society
-
Asnar Y, Moretti R, Sebastianis M, Zannone N (2008) Risk as dependability metrics for the evaluation of business solutions: a model-driven approach. In: Proceedings of the 3rd international conference on availability, reliability and security. IEEE Computer Society, pp 1240-1248
-
(2008)
Proceedings of The 3rd International Conference On Availability, Reliability and Security
, pp. 1240-1248
-
-
Asnar, Y.1
Moretti, R.2
Sebastianis, M.3
Zannone, N.4
-
14
-
-
45849134150
-
Adapting secure tropos for security risk management in the early phases of information systems development
-
LNCS 5074. Springer
-
Matulevicius R, Mayer N, Mouratidis H, Dubois E, Heymans P, Genon N (2008) Adapting secure tropos for security risk management in the early phases of information systems development. In: Proceedings of the 20th international conference on advanced information systems engineering, LNCS 5074. Springer, pp 541-555
-
(2008)
Proceedings of The 20th International Conference On Advanced Information Systems Engineering
, pp. 541-555
-
-
Matulevicius, R.1
Mayer, N.2
Mouratidis, H.3
Dubois, E.4
Heymans, P.5
Genon, N.6
-
15
-
-
33947368645
-
Model-based security analysis in seven steps-a guided tour to the CORAS method
-
Braber F, Hogganvik I, Lund MS, Stolen K, Vraalsen F (2007) Model-based security analysis in seven steps-a guided tour to the CORAS method. BT Technol J 25(1):101-117
-
(2007)
BT Technol J
, vol.25
, Issue.1
, pp. 101-117
-
-
Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stolen, K.4
Vraalsen, F.5
-
16
-
-
85189788266
-
The CORAS methodology: Model-based risk assessment using UML and UP
-
IGI Publishing, Hershey, PA
-
den Braber F, Dimitrakos T, Gran BA, Lund MS, Stolen K, Aagedal JO (2003) The CORAS methodology: model-based risk assessment using UML and UP. In: UML and the unified process. IGI Publishing, Hershey, PA, pp 332-357
-
(2003)
UML and The Unified Process
, pp. 332-357
-
-
den Braber, F.1
Dimitrakos, T.2
Gran, B.A.3
Lund, M.S.4
Stolen, K.5
Aagedal, J.O.6
-
20
-
-
0003714340
-
-
Schneider FB, National Academy Press, Washington
-
Schneider FB (ed) (1998) Trust in cyberspace. National Academy Press, Washington
-
(1998)
Trust In Cyberspace
-
-
-
24
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis A, Laprie J-C, Randell B, Landwehr CE (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput 1(1):11-33
-
(2004)
IEEE Trans Dependable Secur Comput
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.E.4
-
26
-
-
34248195511
-
The psychology of security
-
Schneier B (2007) The psychology of security. Commun ACM 50(5):128
-
(2007)
Commun ACM
, vol.50
, Issue.5
, pp. 128
-
-
Schneier, B.1
-
27
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
Massacci F, Prest M, Zannone N (2005) Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comp Stand Interf 27(5):445-455
-
(2005)
Comp Stand Interf
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
31
-
-
0003696305
-
-
Chung L, Nixon BA, Yu E, Mylopoulos J (eds), Kluwer, Dordrecht
-
Chung L, Nixon BA, Yu E, Mylopoulos J (eds) (2000) Nonfunctional requirements in software engineering. Kluwer, Dordrecht
-
(2000)
NonFunctional Requirements In Software Engineering
-
-
-
36
-
-
33750050331
-
-
Wiley, London
-
Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P (2006) Security patterns: integrating security and systems engineering. Wiley, London
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
38
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26(10):978-1005
-
(2000)
IEEE Trans Softw Eng
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
39
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A (2004) TROPOS: an agent-oriented software development methodology. J Auton Agents Multi-Agent Syst 8(3):203-236
-
(2004)
J Auton Agents Multi-Agent Syst
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
40
-
-
58849148475
-
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
-
Compagna L, Khoury PE, Krausová A, Massacci F, Zannone N (2009) How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif Intell Law 17(1):1-30
-
(2009)
Artif Intell Law
, vol.17
, Issue.1
, pp. 1-30
-
-
Compagna, L.1
Khoury, P.E.2
Krausová, A.3
Massacci, F.4
Zannone, N.5
-
42
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
Mouratidis H, Giorgini P (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2):285-309
-
(2007)
Int J Softw Eng Knowl Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
47
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley C, Laney R, Moffett J, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans Softw Eng 34(1):133-153
-
(2008)
IEEE Trans Softw Eng
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
50
-
-
57049146951
-
Model-based security testing using UMLsec: A case study
-
Jürjens J (2008) Model-based security testing using UMLsec: a case study. Electron Notes Theoretical Comput Sci 220(1):93-104
-
(2008)
Electron Notes Theoretical Comput Sci
, vol.220
, Issue.1
, pp. 93-104
-
-
Jürjens, J.1
|