-
2
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
J.H. Saltzer and M.D. Schroeder, "The protection of information in computer systems", Proceedings of the IEEE, vol. 63, no. 9, pp. 1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
4
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
USENIX Association
-
Alma Whitten and J. D. Tygar, "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", in SSYM'99: Proceedings of the 8th conference on USENIX Security Symposium, Berkeley, CA, USA, 1999, pp. 14-14, USENIX Association.
-
SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium, Berkeley, CA, USA, 1999
, pp. 14-14
-
-
Whitten, A.1
Tygar, J.D.2
-
6
-
-
0030834984
-
Four dark corners of requirements engineering
-
Pamela Zave and Michael Jackson, "Four dark corners of requirements engineering", ACM Trans. Softw. Eng. Methodol., vol. 6, no. 1, pp. 1-30, 1997.
-
(1997)
ACM Trans. Softw. Eng. Methodol.
, vol.6
, Issue.1
, pp. 1-30
-
-
Zave, P.1
Jackson, M.2
-
7
-
-
34748841665
-
Research directions in requirements engineering
-
Washington, DC, USA, IEEE Computer Society
-
Betty H. C. Cheng and Joanne M. Atlee, "Research directions in requirements engineering", in FOSE '07: 2007 Future of Software Engineering, Washington, DC, USA, 2007, pp. 285-303, IEEE Computer Society.
-
(2007)
FOSE '07: 2007 Future of Software Engineering
, pp. 285-303
-
-
Cheng, B.H.C.1
Atlee, J.M.2
-
8
-
-
2942753973
-
Specifying reusable security requirements
-
D. Firesmith, "Specifying reusable security requirements", Journal of Object Technology, vol. 3, no. 1, pp. 61-75, 2004.
-
(2004)
Journal of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
9
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
Daniel Mellado, Eduardo Fernández-Medina, and Mario Piattini, "A common criteria based security requirements engineering process for the development of secure information systems", Computer Standards & Interfaces, vol. 29, no. 2, pp. 244 - 253, 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
11
-
-
32144445926
-
Understanding Task Analysis for Human-Computer Interaction
-
Dan Diaper and Neville A. Stanton, Eds., Lawrence Erlbaum Associates
-
D. Diaper, "Understanding Task Analysis for Human-Computer Interaction", in The Handbook of Task Analysis for Human-Computer Interaction, Dan Diaper and Neville A. Stanton, Eds., pp. 5-47. Lawrence Erlbaum Associates, 2004.
-
(2004)
The Handbook of Task Analysis for Human-Computer Interaction
, pp. 5-47
-
-
Diaper, D.1
-
12
-
-
27644438149
-
-
John Wiley & Sons Ltd
-
Ian. F. Alexander and Neil Maiden, Eds., Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle, John Wiley & Sons Ltd, 2004.
-
(2004)
Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle
-
-
Alexander, I.F.1
Maiden, N.2
-
13
-
-
77954608445
-
Negative scenarios and misuse cases
-
Ian. F. Alexander and Neil Maiden, Eds. John Wiley & Sons Ltd
-
Ian Alexander, "Negative scenarios and misuse cases", in Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle, Ian. F. Alexander and Neil Maiden, Eds. John Wiley & Sons Ltd, 2004.
-
(2004)
Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle
-
-
Alexander, I.1
-
16
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
IEEE Computer Society
-
Axel van Lamsweerde, "Elaborating security requirements by construction of intentional anti-models", in ICSE '04: Proceedings of the 26th International Conference on Software Engineering, Washington, DC, USA, 2004, pp. 148-157, IEEE Computer Society.
-
ICSE '04: Proceedings of the 26th International Conference on Software Engineering, Washington, DC, USA, 2004
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
17
-
-
77950520810
-
A vulnerability-centric requirements engineering framework: Analyzing security attacks, countermeasures, and requirements based on vulnerabilities
-
Golnaz Elahi, Eric Yu, and Nicola Zannone, "A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities", Requirements Engineering, vol. 15, no. 1, pp. 41-62, 2010.
-
(2010)
Requirements Engineering
, vol.15
, Issue.1
, pp. 41-62
-
-
Elahi, G.1
Yu, E.2
Zannone, N.3
-
18
-
-
45849117958
-
Alignment of misuse cases with security risk management
-
March
-
R. Matulevičius, N. Mayer, and P. Heymans, "Alignment of misuse cases with security risk management", Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 1397-1404, March 2008.
-
(2008)
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
, pp. 1397-1404
-
-
Matulevičius, R.1
Mayer, N.2
Heymans, P.3
-
19
-
-
45849134150
-
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development
-
Springer-Verlag
-
Raimundas Matulevičius, Nicolas Mayer, Haralambos Mouratidis, Eric Dubois, Patrick Heymans, and Nicolas Genon, "Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development", in CAiSE '08: Proceedings of the 20th international conference on Advanced Information Systems Engineering, Berlin, Heidelberg, 2008, pp. 541-555, Springer-Verlag.
-
CAiSE '08: Proceedings of the 20th International Conference on Advanced Information Systems Engineering, Berlin, Heidelberg, 2008
, pp. 541-555
-
-
Matulevičius, R.1
Mayer, N.2
Mouratidis, H.3
Dubois, E.4
Heymans, P.5
Genon, N.6
-
21
-
-
77953197799
-
Towards a Unified Framework for Contextual Variability in Requirements
-
Raian Ali, Yijun Yu, Ruzanna Chitchyan, Armstrong Nhlabatsi, and Paolo Giorgini, "Towards a Unified Framework for Contextual Variability in Requirements", 3rd International Workshop on Software Product Management (IWSPM09), Atlanta, USA, 2009.
-
3rd International Workshop on Software Product Management (IWSPM09), Atlanta, USA, 2009
-
-
Ali, R.1
Yu, Y.2
Chitchyan, R.3
Nhlabatsi, A.4
Giorgini, P.5
-
23
-
-
61849118933
-
Reflecting human values in the digital age
-
Abigail Sellen, Yvonne Rogers, Richard Harper, and Tom Rodden, "Reflecting human values in the digital age", Commun. ACM, vol. 52, no. 3, pp. 58-66, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.3
, pp. 58-66
-
-
Sellen, A.1
Rogers, Y.2
Harper, R.3
Rodden, T.4
-
24
-
-
54249165818
-
The case against a positivist philosophy of requirements engineering
-
Chris Hinds, "The case against a positivist philosophy of requirements engineering", Requirements Engineering, vol. 13, no. 4, pp. 315-328, 2008.
-
(2008)
Requirements Engineering
, vol.13
, Issue.4
, pp. 315-328
-
-
Hinds, C.1
-
26
-
-
0027574423
-
Goal-directed requirements acquisition
-
Anne Dardenne, Axel van Lamsweerde, and Stephen Fickas, "Goal-directed requirements acquisition", Science of Computer Programming, vol. 20, no. 1-2, pp. 3-50, 1993.
-
(1993)
Science of Computer Programming
, vol.20
, Issue.1-2
, pp. 3-50
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
28
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
A. van Lamsweerde and E. Letier, "Handling obstacles in goal-oriented requirements engineering", Software Engineering, IEEE Transactions on, vol. 26, no. 10, pp. 978-1005, 2000.
-
(2000)
Software Engineering, IEEE Transactions on
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
29
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
IEEE Computer Society
-
Axel van Lamsweerde, "Elaborating security requirements by construction of intentional anti-models", in ICSE '04: Proceedings of the 26th International Conference on Software Engineering, Washington, DC, USA, 2004, pp. 148-157, IEEE Computer Society.
-
ICSE '04: Proceedings of the 26th International Conference on Software Engineering, Washington, DC, USA, 2004
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
30
-
-
77952393067
-
Analysing and Visualising Security and Usability in IRIS
-
Shamal Faily and Ivan Fléchais, "Analysing and Visualising Security and Usability in IRIS", in Availability, Reliability and Security, 2010. ARES 10. Fifth International Conference on, 2010.
-
Availability, Reliability and Security, 2010. ARES 10. Fifth International Conference on, 2010
-
-
Faily, S.1
Fléchais, I.2
|