-
6
-
-
27144534308
-
Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development
-
S.H. Houmb et al., "Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development," Proc. IEEE Int'l Conf. Eng. Complex Computer Systems, pp. 195-204, 2005.
-
(2005)
Proc. IEEE Int'l Conf. Eng. Complex Computer Systems
, pp. 195-204
-
-
Houmb, S.H.1
-
7
-
-
38349180351
-
An integrated security verification and security solution design trade-off analysis approach
-
H. Mouratidis and P. Giorgini, eds., IGI Global
-
S.H. Houmb et al., "An Integrated Security Verification and Security Solution Design Trade-Off Analysis Approach," Integrating Security and Software Eng.: Advances and Future Vision, H. Mouratidis and P. Giorgini, eds., IGI Global, 2007.
-
(2007)
Integrating Security and Software Eng.: Advances and Future Vision
-
-
Houmb, S.H.1
-
10
-
-
77953123038
-
-
1CORAS
-
1CORAS, IST-2000-25031, 2003.
-
(2003)
IST-2000-25031
-
-
-
11
-
-
27144463943
-
Model based risk assessment in a component- based software engineering process: The CORAS approach to identify security risks
-
F. Barbier, ed. Kluwer
-
K. Stølen et al., "Model Based Risk Assessment in a Component- Based Software Engineering Process: The CORAS Approach to Identify Security Risks," Business Component-Based Software Eng., F. Barbier, ed., pp. 189-207, Kluwer, 2002.
-
(2002)
Business Component-Based Software Eng.
, pp. 189-207
-
-
Stølen, K.1
-
12
-
-
1942468141
-
A UML-based pattern specification technique
-
Mar.
-
R. France et al., "A UML-Based Pattern Specification Technique," IEEE Trans. Software Eng., vol.30, no.3, pp. 193-206, Mar. 2004.
-
(2004)
IEEE Trans. Software Eng.
, vol.30
, Issue.3
, pp. 193-206
-
-
France, R.1
-
13
-
-
5744230994
-
Aspect-oriented approach to design modeling
-
R. France et al., "Aspect-Oriented Approach to Design Modeling," IEE Proc. Software, vol.151, no.4, pp. 173-186, 2004.
-
(2004)
IEE Proc. Software
, vol.151
, Issue.4
, pp. 173-186
-
-
France, R.1
-
14
-
-
85134600809
-
Using alloy and UML/OCL to specify run-time configuration management: A case study
-
A. Evans et al., eds.
-
G. Georg, J. Bieman, and R. France, "Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study," Proc. Workshop pUML-Group Held Together with the UML, A. Evans et al., eds., pp. 128-141, 2001.
-
(2001)
Proc. Workshop PUML-Group Held Together with the UML
, pp. 128-141
-
-
Georg, G.1
Bieman, J.2
France, R.3
-
15
-
-
60849085437
-
An aspect-oriented methodology for designing secure applications
-
G. Georg et al., "An Aspect-Oriented Methodology for Designing Secure Applications," Information and Software Technology, vol.51, no.5, pp. 846-864, 2009.
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
-
16
-
-
33646150573
-
Model composition directives
-
T. Baar et al., eds. Springer
-
G. Straw et al., "Model Composition Directives," The Unified Modelling Language: Modelling Languages and Applications (UML), T. Baar et al., eds., pp. 84-97, Springer, 2004.
-
(2004)
The Unified Modelling Language: Modelling Languages and Applications (UML)
, pp. 84-97
-
-
Straw, G.1
-
17
-
-
77953122512
-
-
2009
-
Alloy, http://alloy.mit.edu, 2009.
-
-
-
-
26
-
-
77953123563
-
-
2009
-
ArgoUML, http://argouml.tigris.org, 2009.
-
-
-
-
28
-
-
33745622446
-
UML2ALLOY: A tool for light- weight modelling of discrete event system
-
N. Guimarães and P.T. Isaías, eds.
-
B. Bordbar and K. Anastasakis, "UML2ALLOY: A Tool for Light- Weight Modelling of Discrete Event System," Proc. Int'l Conf. Applied Computing, N. Guimarães and P.T. Isaías, eds., pp. 209-216, 2005.
-
(2005)
Proc. Int'l Conf. Applied Computing
, pp. 209-216
-
-
Bordbar, B.1
Anastasakis, K.2
-
29
-
-
4444366139
-
An extension of OCL with temporal logic
-
J. Jürjens, ed.
-
P. Ziemann and M. Gogolla, "An Extension of OCL with Temporal Logic," Proc. Workshop Critical Systems Development with UML, J. Jürjens, ed., pp. 53-62, 2002.
-
(2002)
Proc. Workshop Critical Systems Development with UML
, pp. 53-62
-
-
Ziemann, P.1
Gogolla, M.2
-
31
-
-
60949103111
-
Integrating model-based security risk management into ebusiness systems development: The CORAS approach
-
J. Monteiro, P. Swatman, and L. Tavares, eds.
-
T. Dimitrakos et al., "Integrating Model-Based Security Risk Management into Ebusiness Systems Development: The CORAS Approach," Proc. IFIP Conf. E-Commerce, E-Business, E-Government, J. Monteiro, P. Swatman, and L. Tavares, eds., pp. 159-175, 2002.
-
(2002)
Proc. IFIP Conf. E-Commerce, E-Business, E-Government
, pp. 159-175
-
-
Dimitrakos, T.1
-
36
-
-
0034586701
-
Some shortcomings of OCL, the object constraint language of UML
-
Q. Li et al., eds.
-
M. Vaziri and D. Jackson, "Some Shortcomings of OCL, the Object Constraint Language of UML," Proc. Int'l Conf. Technology of Object-Oriented Languages and Systems, Q. Li et al., eds., pp. 555- 562, 2000.
-
(2000)
Proc. Int'l Conf. Technology of Object-Oriented Languages and Systems
, pp. 555-562
-
-
Vaziri, M.1
Jackson, D.2
-
38
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Comm. ACM, vol.21, no.12, pp. 993-999, 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
39
-
-
84974774507
-
Towards operational measures of computer security
-
B. Littlewood et al., "Towards Operational Measures of Computer Security," J. Computer Security, vol.2, nos. 2/3, pp. 211-230, 1993.
-
(1993)
J. Computer Security
, vol.2
, Issue.2-3
, pp. 211-230
-
-
Littlewood, B.1
-
41
-
-
0038620405
-
Making architecture design decisions: An economic approach
-
Carnegie Mellon Univ./Software Eng. Inst.
-
R. Kazman, J. Asundi, and M. Klein, "Making Architecture Design Decisions: An Economic Approach," Technical Report CMU/SEI- 2002-TR-035, Carnegie Mellon Univ./Software Eng. Inst., 2002.
-
(2002)
Technical Report CMU/SEI-2002-TR-035
-
-
Kazman, R.1
Asundi, J.2
Klein, M.3
-
42
-
-
47849124657
-
Applying real options thinking to information security in networked organizations
-
Univ. of Twente
-
M. Daneva, "Applying Real Options Thinking to Information Security in Networked Organizations," CTIT Report TR-CTIT-06-11, Univ. of Twente, 2006.
-
(2006)
CTIT Report TR-CTIT-06-11
-
-
Daneva, M.1
-
43
-
-
0036754796
-
Managing information technology investment risk: A real options perspective
-
M. Benaroch, "Managing Information Technology Investment Risk: A Real Options Perspective," J. Management Information Systems, vol.19, no.2, pp. 43-84, 2002.
-
(2002)
J. Management Information Systems
, vol.19
, Issue.2
, pp. 43-84
-
-
Benaroch, M.1
-
44
-
-
33644693734
-
Return on Security Investment (ROSI)-A practical quantitative model
-
W. Sonnenreich, J. Albanese, and B. Stout, "Return on Security Investment (ROSI)-A Practical Quantitative Model," J. Research and Practice in Information Technology, vol.38, no.1, pp. 45-56, 2006.
-
(2006)
J. Research and Practice in Information Technology
, vol.38
, Issue.1
, pp. 45-56
-
-
Sonnenreich, W.1
Albanese, J.2
Stout, B.3
-
45
-
-
0001094070
-
The use of the CCTA Risk analysis and management methodology CRAMM in health information systems
-
K.C. Lun et al., eds.
-
B. Barber and J. Davey, "The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems," Proc. Medical Informatics Conf., K.C. Lun et al., eds., pp. 1589-1593, 1992.
-
(1992)
Proc. Medical Informatics Conf.
, pp. 1589-1593
-
-
Barber, B.1
Davey, J.2
-
47
-
-
77949309914
-
A UML class diagram analyzer
-
T. Massoni, R. Gheyi, and P. Borba, "A UML Class Diagram Analyzer," Proc. Int'l Workshop Critical Systems Development with UML at UML, pp. 100-114, 2004.
-
(2004)
Proc. Int'l Workshop Critical Systems Development with UML at UML
, pp. 100-114
-
-
Massoni, T.1
Gheyi, R.2
Borba, P.3
-
48
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol ising FDR
-
Tools and Algorithms for the Construction and Analysis of Systems
-
G. Lowe, "Breaking and Fixing the Needham-Schröeder Public- Key Protocol Using FDR," Proc. Int'l Conf. Tools and Algorithms for Construction and Analysis of Systems, T. Margaria and B. Steffen, eds., pp. 147-166, 1996. (Pubitemid 126050413)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1055
, pp. 147-166
-
-
Lowe, G.1
-
49
-
-
31044452475
-
Validating UML and OCL models in USE by automatic snapshot generation
-
M. Gogolla, J. Bohling, and M. Richters, "Validating UML and OCL Models in USE by Automatic Snapshot Generation," Software and System Modeling, vol.4, no.4, pp. 386-398, 2005.
-
(2005)
Software and System Modeling
, vol.4
, Issue.4
, pp. 386-398
-
-
Gogolla, M.1
Bohling, J.2
Richters, M.3
-
50
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security: From UML Models to Access Control Infrastructures," ACM Trans. Software Eng. and Methodology, vol.15, no.1, pp. 39-91, 2006.
-
(2006)
ACM Trans. Software Eng. and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
51
-
-
60849104397
-
Automated analysis of security-design models
-
D. Basin et al., "Automated Analysis of Security-Design Models," Information and Software Technology, vol.51, no.5, pp. 815-831, 2009.
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
|