-
1
-
-
84905870046
-
-
Unified modeling language: Superstructure. August
-
Unified modeling language: Superstructure. Technical report, Object Management Group (OMG), August 2005. http://www.omg.org.
-
(2005)
Technical Report, Object Management Group (OMG)
-
-
-
3
-
-
84911351121
-
Modelling the interplay of conflicting goals with use and misuse cases
-
London, UK, CEUR Workshop Proceedings
-
I. Alexander. Modelling the interplay of conflicting goals with use and misuse cases. In Goal-Oriented Business-Process Modeling (GBMP) 2002, volume 109, London, UK, 2002. CEUR Workshop Proceedings.
-
(2002)
Goal-Oriented Business-Process Modeling (GBMP) 2002
, vol.109
-
-
Alexander, I.1
-
5
-
-
0037299044
-
Misuse cases help to elicit non-functional requirements
-
I. Alexander. Misuse cases help to elicit non-functional requirements. Computing & Control Engineering Journal, 14(1):40-45, 2003.
-
(2003)
Computing & Control Engineering Journal
, vol.14
, Issue.1
, pp. 40-45
-
-
Alexander, I.1
-
6
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
I. Alexander. Misuse cases: Use cases with hostile intent. IEEE Software, 20(1):58-66, 2003.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
8
-
-
0141911037
-
-
Artech House Publishers, Boston, 1 edition, ISBN: 1580533701
-
D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli. Role-Based Access Control. Computer Security Series. Artech House Publishers, Boston, 1 edition, 2003. ISBN: 1580533701.
-
(2003)
Role-Based Access Control. Computer Security Series
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
10
-
-
3042647673
-
Misuse and abuse cases: Getting past the positive
-
May/June
-
P. Hope, G. McGraw, and A. I. Anton. Misuse and abuse cases: Getting past the positive. IEEE Security & Privacy, 2(3):90-92, May/June 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 90-92
-
-
Hope, P.1
McGraw, G.2
Anton, A.I.3
-
13
-
-
33144456824
-
-
Addison-Wesley Software Security Series. Addison-Wesley (Pearson Education), Boston, 1 edition, ISBN: 0321356705
-
G. McGraw. Software Security-Building Security In. Addison-Wesley Software Security Series. Addison-Wesley (Pearson Education), Boston, 1 edition, 2006. ISBN: 0321356705.
-
(2006)
Software Security-Building Security in
-
-
Mcgraw, G.1
-
16
-
-
58149107875
-
Capturing security requirements through misuse cases
-
Tromsø, Norway
-
G. Sindre and A. L. Opdahl. Capturing security requirements through misuse cases. In Norsk Informatikkonferanse (NIK), Tromsø, Norway, 2001.
-
(2001)
Norsk Informatikkonferanse (NIK)
-
-
Sindre, G.1
Opdahl, A.L.2
-
18
-
-
13644252644
-
Eliciting security requirments with misuse cases
-
G. Sindre and A. L. Opdahl. Eliciting security requirments with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
19
-
-
13644271504
-
Generalization/specialization as a structuring mechanism for misuse cases
-
Raleigh, NC, USA
-
G. Sindre, A. L. Opdahl, and G. F. Brevik. Generalization/specialization as a structuring mechanism for misuse cases. In 2nd Symposium on Requirements Engineering for Information Security (SREIS'02),, Raleigh, NC, USA, 2002.
-
(2002)
2nd Symposium on Requirements Engineering for Information Security (SREIS'02)
-
-
Sindre, G.1
Opdahl, A.L.2
Brevik, G.F.3
-
20
-
-
10944258302
-
-
Microsoft Press U.S., ISBN: 0735619913
-
F. Swiderski. Threat Modeling. Microsoft Press U.S., 2004. ISBN: 0735619913.
-
(2004)
Threat Modeling
-
-
Swiderski, F.1
-
21
-
-
4344569744
-
Risk analysis in software design
-
D. Verdon and G. McGraw. Risk analysis in software design. IEEE Security & Privacy, 2(4):79-84, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 79-84
-
-
Verdon, D.1
Mcgraw, G.2
|