-
1
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander, I. (2003). Misuse cases: Use cases with hostile intent. IEEE Software, 20, 58-66.
-
(2003)
IEEE Software
, vol.20
, pp. 58-66
-
-
Alexander, I.1
-
3
-
-
17744389340
-
A requirements taxonomy for reducing Web site privacy vulnerabilities
-
Anton, A. I., & Earp, J. B. (2004). A requirements taxonomy for reducing Web site privacy vulnerabilities. Requirements Engineering, 9(3), 169-185.
-
(2004)
Requirements Engineering
, vol.9
, Issue.3
, pp. 169-185
-
-
Anton, A.I.1
Earp, J.B.2
-
6
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., & Perin, A. (2004). TROPOS: An agent-oriented software development methodology. Journal of Autonomous Agents and Multi-Agent Systems, 8(3), 203-236.
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perin, A.5
-
8
-
-
24944495682
-
-
CERT Coordination Centre, Retrieved from
-
CERT Coordination Centre. (2003). Annual Report. Retrieved from http://www.cert.org
-
(2003)
Annual Report
-
-
-
10
-
-
0141733117
-
Modelling access policies using roles in requirements engineering
-
Crook, R., Ince, D., & Nuseibeh, B. (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45(14), 979-991,
-
(2003)
Information and Software Technology
, vol.45
, Issue.14
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
12
-
-
0003610530
-
-
DTI, Information Security Breaches Survey, Retrieved from
-
DTI, Information Security Breaches Survey. (2004). Technical Report. Retrieved from http://www.dti.gov.uk
-
(2004)
Technical Report
-
-
-
14
-
-
33744905133
-
A pattern language for security models
-
September, Monticello, IL
-
Fernandez, E. B., & Pan, R. (2001, September). A pattern language for security models. Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001), Monticello, IL.
-
(2001)
Proceedings of the 8th Conference On Pattern Languages of Programs (PLoP 2001)
-
-
Fernandez, E.B.1
Pan, R.2
-
16
-
-
0142156745
-
Requirements engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
-
LNCS 2813, Springer-Verlag
-
Giorgini, P., Massacci, F., & Mylopoulos, J. (2003). Requirements engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. Proceedings of the International Conference on Conceptual Modelling (ER) (pp. 263-276). LNCS 2813, Springer-Verlag.
-
(2003)
Proceedings of the International Conference On Conceptual Modelling (ER)
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
17
-
-
35048857793
-
Filling the gap between requirements engineering and public key/trust management infrastructures
-
June 25-26, In K. Sokratis, S. Katsikas, & J. L. Gritzalis (Eds.), Samos Island, Greece. LNCS 3093. Springer
-
Giorgini, P., Massacci, F., Mylopoulos, J., & Zannone, N. (2004, June 25-26). Filling the gap between requirements engineering and public key/trust management infrastructures. In K. Sokratis, S. Katsikas, & J. L. Gritzalis (Eds.), Public Key Infrastructure, Proceedings of the 1st European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece. LNCS 3093. Springer.
-
(2004)
Public Key Infrastructure, Proceedings of the 1st European PKIWorkshop: Research and Applications, EuroPKI 2004
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
19
-
-
34548557819
-
Arguing security: Validating security requirements using structured argumentation
-
(RE'05). Paris
-
Haley, C. B., Moffett, J. D., Laney, R., & Nuseibeh, B. (2005). Arguing security: Validating security requirements using structured argumentation. Proceedings of the 3rd Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05). Paris.
-
(2005)
Proceedings of the 3rd Symposium On Requirements Engineering For Information Security (SREIS'05) Held In Conjunction With the 13th International Requirements Engineering Conference
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
20
-
-
84899297132
-
-
Note
-
IEEE Standard Glossary of Software Engineering Terminology. (1990). IEEE Std 729.
-
-
-
-
23
-
-
79953329648
-
Modelling conversation policies using permissions and obligations
-
January, In F. Dignum, R. van Eijk, & M. Huget (Eds.), LNCS. Springer-Verlag
-
Kagal, L., & Finin, T. (2005, January). Modelling conversation policies using permissions and obligations. In F. Dignum, R. van Eijk, & M. Huget (Eds.), Developments in Agent Communication (Post-proceedings of the AAMAS Workshop on Agent Communication). LNCS. Springer-Verlag.
-
(2005)
Developments In Agent Communication (Post-proceedings of the AAMAS Workshop On Agent Communication)
-
-
Kagal, L.1
Finin, T.2
-
26
-
-
17044370046
-
-
Technical Report 2003/10, The Open University
-
Lin, L. C., Nuseibeh, B., Ince, D., Jackson, M., & Moffett, J. (2003). Analysing security threats and vulnerabilities using abuse frames. Technical Report 2003/10, The Open University.
-
(2003)
Analysing Security Threats and Vulnerabilities Using Abuse Frames
-
-
Lin, L.C.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
28
-
-
79955143136
-
SecureUML: A UML-based modelling language for model-driven security
-
LNCS 2460. Springer-Verlag
-
Lodderstedt, T., Basin, D., & Doser, J. (2002). SecureUML: A UML-based modelling language for model-driven security. Proceedings of the UML'02 (pp. 426-441). LNCS 2460. Springer-Verlag.
-
(2002)
Proceedings of the UML'02
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
33
-
-
8444240069
-
Using security attack scenarios to analyse security during information systems design
-
April, (ICEIS 2004), Porto-Portugal
-
Mouratidis, H., Giorgini, P., & Manson, G. (2004b, April). Using security attack scenarios to analyse security during information systems design. Proceedings of the International Conference on Enterprise Information Systems (ICEIS 2004) (pp. 10-17). Porto-Portugal
-
(2004)
Proceedings of the International Conference On Enterprise Information Systems
, pp. 10-17
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
34
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
Mouratidis, H., Giorgini P., & Manson, G. (2005a). When security meets software engineering: A case of modelling secure information systems. Information Systems, 30(8), 609-629.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
35
-
-
38049137252
-
A secure architectural description language for agent systems
-
Utrecht, The Netherlands: ACM
-
Mouratidis, H., Kolp, M., Faulkner, S., & Giorgini, P. (2005b). A secure architectural description language for agent systems. Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (pp. 578-585). Utrecht, The Netherlands: ACM.
-
(2005)
Proceedings of the 4th International Joint Conference On Autonomous Agents and Multiagent Systems
, pp. 578-585
-
-
Mouratidis, H.1
Kolp, M.2
Faulkner, S.3
Giorgini, P.4
-
36
-
-
33646184981
-
Security patterns meet agent oriented software engineering: A complementary solution for developing security information systems
-
Lecture Notes in Computer Science 3716. Springer-Verlag
-
Mouratidis, H., Weiss, M., & Giorgini, P. (2005c). Security patterns meet agent oriented software engineering: A complementary solution for developing security information systems. Proceedings of the 24th International Conference on Conceptual Modelling (ER) (pp. 225-240). Lecture Notes in Computer Science 3716. Springer-Verlag.
-
(2005)
Proceedings of the 24th International Conference On Conceptual Modelling (ER)
, pp. 225-240
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
38
-
-
84899228823
-
-
Note
-
OMG. (2003). UML 2.0 Specification.
-
-
-
-
40
-
-
0022044193
-
A taxonomy of current issues in requirements engineering
-
April
-
Roman, G. C. (1985, April). A taxonomy of current issues in requirements engineering. IEEE Computer, 18(4), 14-23.
-
(1985)
IEEE Computer
, vol.18
, Issue.4
, pp. 14-23
-
-
Roman, G.C.1
-
42
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Saltzer, J., & Schroeder, M. D. (1975, September). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.D.2
-
45
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., & Opdahl, A. L. (2005). Eliciting security requirements with misuse cases. Requirements Engineering, 10(1), 34-44.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
48
-
-
8344261752
-
Modelling computer attacks: A target-centric ontology for intrusion-detection
-
Retrieved from
-
Undercoffer, J., & Pinkston, J. (2002). Modelling computer attacks: A target-centric ontology for intrusion-detection. Proceedings of the CADIP research symposium. Retrieved from http://www.cs.umbc.edu/cadip/2002Symposium
-
(2002)
Proceedings of the CADIP Research Symposium
-
-
Undercoffer, J.1
Pinkston, J.2
-
49
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
Van Lamsweerde, A., & Letier, E. (2000). Handling obstacles in goal-oriented requirements engineering. Transactions of Software Engineering, 26(10), 978-1005.
-
(2000)
Transactions of Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
52
-
-
33745782245
-
Designing for privacy and other competing requirements
-
November 15-16, Raleigh, NC
-
Yu, E., & Cysneiros, L. (2002, November 15-16). Designing for privacy and other competing requirements. The 2nd Symposium on Requirements Engineering for Information Security (SREIS' 02), Raleigh, NC.
-
(2002)
The 2nd Symposium On Requirements Engineering For Information Security (SREIS' 02)
-
-
Yu, E.1
Cysneiros, L.2
|