-
1
-
-
77954319578
-
Octave framework, Version 1.0
-
SEI. CMU/SEI-99-TR-017, September
-
C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson, "OCTAVE Framework, Version 1.0", Carnegie Mellon. SEI. CMU/SEI-99-TR-017, September 1999.
-
(1999)
Carnegie Mellon
-
-
Alberts, C.J.1
Behrens, S.G.2
Pethia, R.D.3
Wilson, W.R.4
-
2
-
-
0037240812
-
Misuse Cases: Use cases with hostile intent
-
I. Alexander, "Misuse Cases: Use Cases with Hostile Intent", IEEE Computer Software, vol.20, pp. 58-66, 2003.
-
(2003)
IEEE Computer Software
, vol.20
, pp. 58-66
-
-
Alexander, I.1
-
3
-
-
1942532238
-
XML-based specification for web services document security
-
R. Bhatti, E. Bertino, A. Ghafoor, and J. B. D. Joshi, "XML-Based Specification for Web Services Document Security", IEEE Computer, vol.37, pp. 41-49, 2004.
-
(2004)
IEEE Computer
, vol.37
, pp. 41-49
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
Joshi, J.B.D.4
-
4
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, V. Lotz, and G. Wimmel, "Key Issues of a Formally Based Process Model for Security Engineering", Proc. 16th International Conference on Software and Systems Engineering and their Applications (ICSSEA'03), 2003.
-
(2003)
Proc. 16th International Conference on Software and Systems Engineering and Their Applications (ICSSEA'03)
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Lotz, V.6
Wimmel, G.7
-
5
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. D. C. d. Vimercati, S. Paraboschi, and P. Samarati., "A fine-grained access control system for XML documents", ACM Transactions on Information and System Security (TISSEC), pp. 169-202, 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, pp. 169-202
-
-
Damiani, E.1
Vimercati, S.D.C.D.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
26844477141
-
Patterns: Service-oriented architecture and web services
-
1st ed
-
M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, and T. Newling, "Patterns: Service-Oriented Architecture and Web Services", IBM Redbook, 1st ed, 2004, pp. 345.
-
(2004)
IBM Redbook
, pp. 345
-
-
Endrei, M.1
Ang, J.2
Arsanjani, A.3
Chua, S.4
Comte, P.5
Krogdahl, P.6
Luo, M.7
Newling, T.8
-
9
-
-
2942757657
-
Engineering security requirements
-
D. G. Firesmith, "Engineering Security Requirements", Journal of Object Technology, vol.2, pp. 53-68, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, pp. 53-68
-
-
Firesmith, D.G.1
-
10
-
-
32044443362
-
-
SEI, Technical Note CMU/SEI-2003-TN-033, December
-
D. G. Firesmith, "Common Concepts Underlying Safety, Security, and Survivability Engineering", SEI, Technical Note CMU/SEI-2003-TN-033, December 2003.
-
(2003)
Common Concepts Underlying Safety, Security, and Survivability Engineering
-
-
Firesmith, D.G.1
-
11
-
-
70449097155
-
Web Services Security: Is the Problem Solved?
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Web Services Security: is the problem solved?" Information Systems Security, vol.13, pp. 22-31, 2004. (Pubitemid 39101929)
-
(2004)
INFORMATION SYSTEMS SECURITY
, vol.13
, Issue.3
, pp. 22-31
-
-
Gutierrez, C.1
Fernandez-Medina, E.2
Piattini, M.3
-
12
-
-
38949162568
-
PWSSec: Process for web services security
-
Orlando, Florida, USA
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "PWSSec: Process for Web Services Security", Proc. IEEE International Conference on Web Services 2005, Orlando, Florida, USA, 2005.
-
(2005)
Proc. IEEE International Conference on Web Services 2005
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
13
-
-
78651452980
-
Towards a process for web services security
-
Miami, Florida, USA
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Towards a Process for Web Services Security", Proc. WOSIS'05 en ICEIS'05, Miami, Florida, USA, 2005.
-
(2005)
Proc. WOSIS'05 en ICEIS'05
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
14
-
-
77954321317
-
-
IDC, 2005. See: http://www.idc.com/getdoc.jsp?containerId=prUS00190705].
-
(2005)
-
-
-
15
-
-
4544368101
-
Authorization service for web services and its implementation
-
San Diego, California, USA
-
S. Indrakanti, V. Varadharajan, and M. Hitchens, "Authorization Service for Web Services and its Implementation", Proc. ICWS'04, San Diego, California, USA, 2004.
-
(2004)
Proc. ICWS'04
-
-
Indrakanti, S.1
Varadharajan, V.2
Hitchens, M.3
-
19
-
-
12344314483
-
-
Department of Computer Science, University of York, UK, Report YCS 368, August
-
J. D. Moffet and B. A. Nuseibeh, "A Framework for Security Requirements Engineering", Department of Computer Science, University of York, UK, Report YCS 368, August 2003.
-
(2003)
A Framework for Security Requirements Engineering
-
-
Moffet, J.D.1
Nuseibeh, B.A.2
-
25
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier, "Attack Trees: Modeling Security Threats", Dr. Dobb's Journal, 1999.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
26
-
-
77954339399
-
Eliciting security requirements with misuse cases
-
Sydney, Australia
-
G. Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases", Proc. TOOLS-37'00, Sydney, Australia, 2000.
-
(2000)
Proc. TOOLS-37'00
-
-
Sindre, G.1
Opdahl, A.L.2
-
28
-
-
4744347868
-
Best-practice patterns and tool support for configuring secure web services messaging
-
San Diego, California, USA
-
M. Tatsubori, T. Imamura, and Y. Nakamura, "Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging", Proc. 4th International Conference on Web Services (ICWS'04), San Diego, California, USA, 2004.
-
(2004)
Proc. 4th International Conference on Web Services (ICWS'04)
-
-
Tatsubori, M.1
Imamura, T.2
Nakamura, Y.3
-
29
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
A. Toval, J. Nicolás, B. Moros, and F. García, "Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach", Requirements Engineering Journal, vol.6, pp. 205-219, 2001.
-
(2001)
Requirements Engineering Journal
, vol.6
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
-
30
-
-
4344569744
-
Risk analysis in software design
-
D. Verdon and G. McGraw, "Risk Analysis in Software Design", in IEEE Security & Privacy, vol.2, 2004, pp. 79-84.
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 79-84
-
-
Verdon, D.1
McGraw, G.2
-
31
-
-
4544279898
-
-
VeriSign Microsoft, SonicSoftware IBM BEA and SAP
-
VeriSign, Microsoft, SonicSoftware, IBM, BEA, and SAP, "Web Services Policy Framework (WS-Policy)", 2004.
-
(2004)
Web Services Policy Framework (WS-Policy)
-
-
-
32
-
-
77954326316
-
A role based access control for web services
-
San Diego, California, USA
-
R. Wonohoesodo and Z. Tari, "A Role based Access Control for Web Services", Proc. ICWS'04, San Diego, California, USA, 2004.
-
(2004)
Proc. ICWS'04
-
-
Wonohoesodo, R.1
Tari, Z.2
|