-
4
-
-
84970947585
-
Software engineering for security: A roadmap
-
June 4-11, 2000. Limerick Ireland. ACM
-
Premkumar T, Devanbu, Stuart G. Stubblebine: Software engineering for security: a roadmap. In: ICSE 2000, 22nd International Conference on Software Engineering, Future of Software Engineering Track, June 4-11, 2000. Limerick Ireland. ACM, 2000. pp 227-239.
-
(2000)
ICSE 2000, 22nd International Conference on Software Engineering, Future of Software Engineering Track
, pp. 227-239
-
-
Devanbu, P.T.1
Stubblebine, S.G.2
-
6
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J, Schroeder M. The protection of information in computer systems. Proc IEEE. 1975; 63(9): 1278-1308.
-
(1975)
Proc IEEE.
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
11
-
-
85045573601
-
Using abuse care models for security requirements analysis
-
December
-
McDermott J, Fox C. Using abuse care models for security requirements analysis. In: Proc 15th Annu Comput Sec Appl Conf, December 1999. pp 55-67.
-
(1999)
Proc 15th Annu Comput Sec Appl Conf
, pp. 55-67
-
-
McDermott, J.1
Fox, C.2
-
12
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G, Opdahl AL. Eliciting security requirements with misuse cases. Requirements Eng 2005; 10(1): 34-44.
-
(2005)
Requirements Eng
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
13
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
IEEE Comput Soc Press, 29 August 2 September
-
Giorgini P, Massacci F, Mylopoulos J, Zannone N. Modeling security requirements through ownership, permission and delegation. In: Proc 13th IEEE Int Requirements Eng Conf (RE'05), IEEE Comput Soc Press, 29 August 2 September, 2005.
-
(2005)
Proc 13th IEEE Int Requirements Eng Conf (RE'05)
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
15
-
-
84899324292
-
Identifying security requirements using the security quality requirements engineering (SQUARE) method
-
Hershey PA: Idea Publishing Group
-
Mead NR. Identifying security requirements using the security quality requirements engineering (SQUARE) method. In: Integrating security and software engineering. Hershey, PA: Idea Publishing Group; 2006. pp 44-69.
-
(2006)
Integrating Security and Software Engineering
, pp. 44-69
-
-
Mead, N.R.1
-
16
-
-
23944475544
-
When security meets software engineering: A case of modeling secure information systems
-
Mouratidis H, Giorgini P, Manson G. When security meets software engineering: a case of modeling secure information systems. Inf Syst 2005; 30(8): 609-629.
-
(2005)
Inf Syst
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
17
-
-
3142750497
-
TROPOS: An agent oriented software development methodology
-
Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A. TROPOS: an agent oriented software development methodology. J Autonomous Agents and Multi-Agent Sys 2004; 8(3): 203-236.
-
(2004)
J Autonomous Agents and Multi-Agent Sys
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
18
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
ACM
-
Jan Jü rjens. Sound methods and effective tools for model-based security engineering with UML. ICSE 2005, ACM, 2005. pp 322-331.
-
(2005)
ICSE 2005
, pp. 322-331
-
-
Jürjens, J.1
-
19
-
-
34547455692
-
Security analysis of Crypto-based Java programs using automated theorem provers
-
Jan Jürjens. Security analysis of Crypto-based Java programs using automated theorem provers. ASE 2006, IEEE Comput Sec 2006. pp 167-176.
-
(2006)
ASE 2006, IEEE Comput Sec
, pp. 167-176
-
-
Jürjens, J.1
-
20
-
-
0027543460
-
An object-oriented framework for model management and DSS development
-
Muhanna W, W. An object-oriented framework for model management and DSS development. Decision Support Syst 1993; 9(2): 217-229.
-
(1993)
Decision Support Syst
, vol.9
, Issue.2
, pp. 217-229
-
-
Muhanna, W.W.1
-
21
-
-
77954475364
-
Secrets & lies: Digital security in a networked world
-
Schneier B. Secrets & lies: digital security in a networked world. New York: Wiley; 2000.
-
(2000)
New York: Wiley
-
-
Schneier, B.1
-
22
-
-
77954504775
-
-
Business Requirements ver. 7, Functional Requirements ver. 6.3, Technical Specification ver. 2.2. 2000. Available online at
-
CEPSCO. Common Electronic Purse Specifications. Business Requirements ver. 7, Functional Requirements ver. 6.3, Technical Specification ver. 2.2. 2000. Available online at http://www.cepsco.com.
-
Common Electronic Purse Specifications
-
-
-
23
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
March 1
-
D. Elliott Bell and Leonard J. Lapadula: " Secure Computer Systems: Mathematical Foundations" MITRE Technical Report 2547, Vol I, March 1, 1973.
-
(1973)
MITRE Technical Report 2547
, vol.1
-
-
Bell, D.E.1
Lapadula, L.J.2
-
26
-
-
0029191009
-
Dealing with non-functional requirements: Three experimental studies of a process-oriented approach
-
Seattle WA
-
Chung L, Nixon B. Dealing with non-functional requirements: three experimental studies of a process-oriented approach. In: Proc 17th Int Conf on Softw Eng, Seattle, WA; 1995.
-
(1995)
Proc 17th Int Conf on Softw Eng
-
-
Chung, L.1
Nixon, B.2
-
28
-
-
17744389340
-
A requirements taxonomy to reduce Web site privacy vulnerabilities
-
Antó n AI, Earp JB. A requirements taxonomy to reduce Web site privacy vulnerabilities. Requir Eng J 2004; 9(3): 169-185.
-
(2004)
Requir Eng J
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
29
-
-
0141733117
-
Modelling access policies using roles requirements engineering
-
Crook R, Ince D, Nuseibeh B. Modelling access policies using roles Requirements Engineering. Inf Softw Technol 2003; 45(14): 979-991.
-
(2003)
Inf Softw Technol
, vol.45
, Issue.14
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
30
-
-
84942929509
-
Introducing abuse frames for analyzing security requirements
-
Poster Paper, Monterey, CA, Sept. 8-12
-
Lin L, Nuseibeh B, Ince D, Jackson M, Moffett J. Introducing abuse frames for analyzing security requirements. Poster Paper, Proc 11th IEEE Int Requirements Eng Conf (RE'03), Monterey, CA, Sept. 8-12, 2003. pp 371-372.
-
(2003)
Proc 11th IEEE Int Requirements Eng Conf (RE'03)
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
32
-
-
84899251780
-
Arguing satisfaction of security requirements
-
Hershey PA: Idea Publishing Group
-
Haley CB, Laney R,Moffett JD, Nuseibeh B. Arguing satisfaction of security requirements. In: Integrating security and software engineering. Advances and future visions. Hershey, PA: Idea Publishing Group; 2006, pp 16-43.
-
(2006)
Integrating Security and Software Engineering. Advances and Future Visions
, pp. 16-43
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
33
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander I. Misuse cases: Use cases with hostile intent. IEEE Softw 2003; 20(1): 58-66.
-
(2003)
IEEE Softw
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
34
-
-
0039372661
-
Viewing business-process security from different perspectives
-
Hermann G, Pernul G. Viewing business-process security from different perspectives. Int J Electron Commence 1999; 3: 89-103.
-
(1999)
Int J Electron Commence
, vol.3
, pp. 89-103
-
-
Hermann, G.1
Pernul, G.2
-
35
-
-
0034816038
-
A method for designing secure solutions
-
Whitmore J.J., A method for designing secure solutions, IBM Syst J 2001; 40(3): 747-768
-
(2001)
IBM Syst J
, vol.40
, Issue.3
, pp. 747-768
-
-
Whitmore, J.J.1
-
36
-
-
0034816038
-
-
Reading, MA: Addison-Wesley
-
Whitmore JJ. A method for designing secure solutions, IBM Syst J 2001; 40(3): 747-768. 36. Viega J, McGraw G. Building a secure software. Reading, MA: Addison-Wesley; 2002.
-
Building A Secure Software
, pp. 2002
-
-
Viega, J.1
McGraw, G.2
-
37
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Proc 5th Int Conf on the unified Modelling Language
-
Lodderstedt T, Basin DA, Doser J, SecureUML: A UML-based modeling language for model-driven security. In: Proc 5th Int Conf on the unified Modelling Language. Lecture Notes in Computer Science, 2002. Vol 2460, pp 426-441.
-
(2002)
Lecture Notes in Computer Science
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
40
-
-
35348977674
-
Model based development of access policies
-
Breu R, Popp G, Alam M. Model based development of access policies. STTT 9 2007; (5-6): 457-470.
-
(2007)
STTT
, vol.9
, Issue.5-6
, pp. 457-470
-
-
Breu, R.1
Popp, G.2
Alam, M.3
-
41
-
-
33750050331
-
-
Willey
-
Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P. Security patterns: integrating security and systems engineering, Willey; 2005.
-
(2005)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
42
-
-
33745804721
-
Modelling secure systems using an agent-oriented approach and security patterns
-
Mouratidis H, Weiss M, Giorgini P. Modelling secure systems using an agent-oriented approach and security patterns. Int J Softw Eng Knowl Eng 2006; 16(3): 471-498.
-
(2006)
Int J Softw Eng Knowl Eng
, vol.16
, Issue.3
, pp. 471-498
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
43
-
-
33746038490
-
Towards a comprehensive framework for secure systems development
-
CAiSE 2006. Springer-Verlag
-
Mouratidis H, Jürjens J, Fox J. Towards a Comprehensive Framework for Secure Systems Development, CAiSE 2006, Lecture Notes in Computer Science 4001. Springer-Verlag; 2006, pp 48-62.
-
(2006)
Lecture Notes in Computer Science
, vol.4001
, pp. 48-62
-
-
Mouratidis, H.1
Jürjens, J.2
Fox, J.3
|