-
3
-
-
24344499838
-
Architectural patterns for problem frames
-
C. Choppy, D. Hatebur, and M. Heisel, "Architectural patterns for problem frames", IEE Proceedings-Software, 152(4), pp. 198-208, 2005
-
(2005)
IEE Proceedings-Software
, vol.152
, Issue.4
, pp. 198-208
-
-
Choppy, C.1
Hatebur, D.2
Heisel, M.3
-
4
-
-
0003696305
-
-
Kluwer Academic Publishers
-
L. Chung, B. A. Nixon, E. Yu, and J. Mylopoulos, "Non-Functional Requirements in Software Engineering", Kluwer Academic Publishers, 2000
-
(2000)
Non-Functional Requirements in Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
5
-
-
84861084983
-
COTS-Aware Requirements Engineering: The CARE Process
-
L. Chung, K. Cooper, and S. Courtney,"COTS-Aware Requirements Engineering: The CARE Process", Proc. Int. Workshop on Requirements Engineering on COTS (RECOTS04), Kyoto, Japan, 2004
-
Proc. Int. Workshop on Requirements Engineering on COTS (RECOTS04), Kyoto, Japan, 2004
-
-
Chung, L.1
Cooper, K.2
Courtney, S.3
-
9
-
-
36448967526
-
Attack patterns: A new forensic and design tool
-
E.B. Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, "Attack patterns: A new forensic and design tool", Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics, Orlando, 2007
-
Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics, Orlando, 2007
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
-
10
-
-
33744905133
-
A pattern language for security models
-
E. Fernandez and R. Pan, "A pattern language for security models", PLoP 2001
-
(2001)
PLoP
-
-
Fernandez, E.1
Pan, R.2
-
13
-
-
0003880013
-
-
Addison-Wesley
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides, "Design patterns: elements of reusable object-oriented software", Addison-Wesley, 1995
-
(1995)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
14
-
-
84976826756
-
Semantic Database Modelling: Survey, applications and research issues
-
R. Hull and R. King, "Semantic Database Modelling: Survey, applications and research issues", ACM Computing Surveys, 19(3), pp. 202-260, 1987
-
(1987)
ACM Computing Surveys
, vol.19
, Issue.3
, pp. 202-260
-
-
Hull, R.1
King, R.2
-
17
-
-
33644536246
-
Organizational patterns for early requirements analysis
-
Springer
-
Kolp, M. and Giorgini, P. and Mylopoulos, J., "Organizational patterns for early requirements analysis", LNCS, pp. 617-632, Springer, 2003
-
(2003)
LNCS
, pp. 617-632
-
-
Kolp, M.1
Giorgini, P.2
Mylopoulos, J.3
-
18
-
-
37349080248
-
The Tropos Methodology
-
Springer
-
P. Giorgini, M. Kolp, J. Mylopoulos, and M. Pistore, "The Tropos Methodology", Methodologies And Software Engineering For Agent Systems, Springer, pp. 89-106
-
Methodologies and Software Engineering for Agent Systems
, pp. 89-106
-
-
Giorgini, P.1
Kolp, M.2
Mylopoulos, J.3
Pistore, M.4
-
19
-
-
0003026194
-
From non-functional requirements to design through patterns
-
Springer
-
D. Gross and E. Yu, "From non-functional requirements to design through patterns", Requirements Engineering, 6(1), pp. 18-36, Springer, 2001
-
(2001)
Requirements Engineering
, vol.6
, Issue.1
, pp. 18-36
-
-
Gross, D.1
Yu, E.2
-
20
-
-
52149125061
-
Using patterns for sharing requirements engineering process rationales
-
Springer
-
L. Hagge, F. Houdek, K. Lappe, and B. Paech, "Using patterns for sharing requirements engineering process rationales", Rationale Management in Software Engineering, Springer, pp. 409-426, 2006
-
(2006)
Rationale Management in Software Engineering
, pp. 409-426
-
-
Hagge, L.1
Houdek, F.2
Lappe, K.3
Paech, B.4
-
21
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
CB Haley, R. Laney, JD Moffett, and B. Nuseibeh, "Security requirements engineering: A framework for representation and analysis", IEEE Transactions on Software Engineering, 34(1), pp 133-153, 2008
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
22
-
-
79952766482
-
-
S. Hilley (editor), Elsevier, Apr.
-
S. Hilley (editor), Computer Fraud and Security, Elsevier, Apr. 2007
-
(2007)
Computer Fraud and Security
-
-
-
25
-
-
17744386105
-
From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering
-
A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens, "From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering", Proc. of RHAS at RE'03, 3:49-56, 2003.
-
(2003)
Proc. of RHAS at RE'03
, vol.3
, pp. 49-56
-
-
Van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
-
26
-
-
17044370046
-
Analysing security threats and vulnerabilities using abuse frames
-
L.C. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett, "Analysing security threats and vulnerabilities using abuse frames", ETAPS-04
-
ETAPS-04
-
-
Lin, L.C.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
27
-
-
0026397113
-
Questions, options, and criteria: Elements of design space analysis
-
Taylor & Francis
-
MacLean, A. and Young, R.M. and Bellotti, V.M.E. and Moran, T.P., "Questions, options, and criteria: Elements of design space analysis", Human-Computer Interaction, 6(3), pp. 201-250, Taylor & Francis, 1991
-
(1991)
Human-Computer Interaction
, vol.6
, Issue.3
, pp. 201-250
-
-
MacLean, A.1
Young, R.M.2
Bellotti, V.M.E.3
Moran, T.P.4
-
28
-
-
29544451645
-
Generating requirements from systems models using patterns: A case study
-
Springer
-
N.A.M. Maiden, S. Manning, S. Jones, and J. Greenwood, "Generating requirements from systems models using patterns: a case study", Requirements Engineering, 10(4), pp 276-288, 2005, Springer
-
(2005)
Requirements Engineering
, vol.10
, Issue.4
, pp. 276-288
-
-
Maiden, N.A.M.1
Manning, S.2
Jones, S.3
Greenwood, J.4
-
29
-
-
77953177867
-
A pattern language for pattern writing
-
G. Meszaros and J. Doble, "A pattern language for pattern writing", PLoP95
-
PLoP95
-
-
Meszaros, G.1
Doble, J.2
-
30
-
-
77953180892
-
-
Office Of The Privacy Commissioner Of Canada And Office Of The Information And Privacy Commissioner Of Alberta, Report of an Investigation into the Security, Collection and Retention of Personal Information of TJX Companies Inc. and Winners Merchant International L.P., Sep. 24, 2007
-
Office Of The Privacy Commissioner Of Canada And Office Of The Information And Privacy Commissioner Of Alberta, Report of an Investigation into the Security, Collection and Retention of Personal Information of TJX Companies Inc. and Winners Merchant International L.P., Sep. 24, 2007
-
-
-
-
31
-
-
77953218797
-
-
Payment Card Industry, v 1.1
-
Payment Card Industry, "Data Security Standard v 1.1", 2005
-
(2005)
Data Security Standard
-
-
-
32
-
-
70450256774
-
Breaking the Code: How Credit-Card Data Went Out Wireless Door
-
May 4
-
J. Pereira, "Breaking The Code: How Credit-Card Data Went Out Wireless Door", The Wall Street Journal, May 4, 2007
-
(2007)
The Wall Street Journal
-
-
Pereira, J.1
-
33
-
-
33750050331
-
-
John Wiley & Sons
-
M. Schumacher, E. Fernandez, D. Hybertson, and F. Buschmann, "Security Patterns: Integrating security and systems engineering", John Wiley & Sons, 2005
-
(2005)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.2
Hybertson, D.3
Buschmann, F.4
-
34
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10:34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
38
-
-
0035438855
-
Observations on using genetic algorithms for dynamic load-balancing
-
A.Y. Zomaya, and Y.H. Teh, "Observations on using genetic algorithms for dynamic load-balancing", IEEE Trans. on Parallel and Dist. Systems, pp. 899-911, 2001
-
(2001)
IEEE Trans. on Parallel and Dist. Systems
, pp. 899-911
-
-
Zomaya, A.Y.1
Teh, Y.H.2
|