-
1
-
-
77950516100
-
Integrating privacy requirements into security requirements engineering
-
S. Abu-Nimeh, S. Miyazaki, N.R. Mead, Integrating privacy requirements into security requirements engineering, in SEKE, 2009, pp. 542-547.
-
(2009)
SEKE
, pp. 542-547
-
-
Abu-Nimeh, S.1
Miyazaki, S.2
Mead, N.R.3
-
2
-
-
33746338083
-
-
Guide v2.0, C.M.U. Software Engineering Institute, Editor Pittsburgh (USA)
-
C. Alberts, A. Dorofee, OCTAVE Method Implementation Guide v2.0, C.M.U. Software Engineering Institute, Editor, 2001, Pittsburgh (USA).
-
(2001)
OCTAVE Method Implementation
-
-
Alberts, C.1
Dorofee, A.2
-
3
-
-
49049091234
-
Architecture reasoning for supporting product line evolution: An example on security
-
J.L. Arciniegas, J.C. Dueñas, J.L. Ruiz, R. Cerón, J. Bermejo, and M.A. Oltra Architecture reasoning for supporting product line evolution: an example on security T. Käkölä, J.C. Dueñas, Software Product Lines: Research Issues in Engineering and Management 2006 Springer
-
(2006)
Software Product Lines: Research Issues in Engineering and Management
-
-
Arciniegas, J.L.1
Dueñas, J.C.2
Ruiz, J.L.3
Cerón, R.4
Bermejo, J.5
Oltra, M.A.6
-
6
-
-
34548787238
-
Model-based security engineering of distributed information systems using UMLsec
-
Bastian Best, Jan Jürjens, B. Nuseibeh, Model-based security engineering of distributed information systems using UMLsec, in: 29th International Conference on Software Engineering (ICSE 2007), 2007, pp. 581-590.
-
(2007)
29th International Conference on Software Engineering (ICSE 2007)
, pp. 581-590
-
-
Bastian, B.1
Jan, J.2
Nuseibeh, B.3
-
7
-
-
84887967350
-
Consolidated product line variability modeling
-
T.Käkölä, J.C. Dueñas (Eds.)
-
J. Bayer, S. Gerard, O. Haugen, J. Mansell, B. Moller-Pedersen, J. Oldevik, P. Tessier, J.-P. Thibault, T. Widen, Consolidated product line variability modeling, in: T.Käkölä, J.C. Dueñas (Eds.), Software Product Lines: Research Issues in Engineering and Management, 2005, pp. 195-241.
-
(2005)
Software Product Lines: Research Issues in Engineering and Management
, pp. 195-241
-
-
Bayer, J.1
Gerard, S.2
Haugen, O.3
Mansell, J.4
Moller-Pedersen, B.5
Oldevik, J.6
Tessier, P.7
Thibault, J.-P.8
Widen, T.9
-
8
-
-
84870365750
-
Requirements prioritization
-
A. Aurum, C. Wohlin (Eds.)
-
P. Berander, A. Andrews, Requirements prioritization, in: A. Aurum, C. Wohlin (Eds.), Engineering and Managing Software Requirements, 2005, pp. 69-94.
-
(2005)
Engineering and Managing Software Requirements
, pp. 69-94
-
-
Berander, P.1
Andrews, A.2
-
11
-
-
48049085565
-
Scenario-based application requirements engineering
-
T. Käkölä, J.C. Dueñas (Eds.)
-
S. Bühne, G. Halmans, K. Lauenroth, K. Pohl, Scenario-based application requirements engineering, in: T. Käkölä, J.C. Dueñas (Eds.), Software Product Lines - Research Issues in Engineering and Management, 2005, pp. 161-194.
-
(2005)
Software Product Lines - Research Issues in Engineering and Management
, pp. 161-194
-
-
Bühne, S.1
-
12
-
-
77955414537
-
-
CERT/CC, CERT/CC Statistics 1995-2008
-
CERT/CC, CERT/CC Statistics 1995-2008, 2009. < http://www.cert.org/ stats/fullstats.html >.
-
(2009)
-
-
-
14
-
-
58849148475
-
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
-
L. Compagna, P.E. Khoury, A. Krausová, F. Massacci, and N. Zannone How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns Artificial Intelligence and Law 17 1 2009 1 30
-
(2009)
Artificial Intelligence and Law
, vol.17
, Issue.1
, pp. 1-30
-
-
Compagna, L.1
Khoury, P.E.2
Krausová, A.3
Massacci, F.4
Zannone, N.5
-
15
-
-
36849025796
-
Future directions in technology-enabled crime: 2007-09
-
Australian-Government, Editor, Australian Institute of Criminology
-
K.-K.R. Choo, R.G. Smith, R. McCusker, Future directions in technology-enabled crime: 2007-09, in: Research and Public Policy Series, Australian-Government, Editor, 2007, Australian Institute of Criminology.
-
(2007)
Research and Public Policy Series
-
-
Choo, K.-K.R.1
Smith, R.G.2
McCusker, R.3
-
17
-
-
2942757657
-
Engineering security requirements
-
D.G. Firesmith Engineering security requirements Journal of Object Technology 2 1 2003 53 68
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 53-68
-
-
Firesmith, D.G.1
-
19
-
-
34548719253
-
Engineering safety and security related requirements for software intensive systems
-
IEEE Computer Society
-
D.G. Firesmith, Engineering safety and security related requirements for software intensive systems, in: International Conference on Software Engineering, IEEE Computer Society, 2007, p. 169.
-
(2007)
International Conference on Software Engineering
, pp. 169
-
-
Firesmith, D.G.1
-
21
-
-
33750132927
-
Requirements negotiation
-
A. Aurum, C. Wohlin (Eds.)
-
P. Grünbacher, N. Seyff, Requirements negotiation, in: A. Aurum, C. Wohlin (Eds.), Engineering and Managing Software Requirements, 2005, pp. 143-162.
-
(2005)
Engineering and Managing Software Requirements
, pp. 143-162
-
-
Grünbacher, P.1
-
22
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
C.B. Haley, R. Laney, J.D. Moffet, and B. Nuseibeh Security requirements engineering: a framework for representation and analysis IEEE Transactions on Software Engineering 34 1 2008 133 153
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.2
Moffet, J.D.3
Nuseibeh, B.4
-
27
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
UML 2002 - The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools LNCS 2460
-
J. Jürjens, UMLsec: extending UML for secure systems development, in: UML 2002 - The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools. 5th International Conference, LNCS 2460, 2002, pp. 412-425.
-
(2002)
5th International Conference
, pp. 412-425
-
-
Jürjens, J.1
-
29
-
-
47249142498
-
Automated analysis of permission-based security using UMLsec
-
J. Jürjens, J. Schreck, Y. Yu, Automated analysis of permission-based security using UMLsec, in: Fundamental Approaches to Software Engineering (FASE 2008), held as part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2008), 2008, pp. 292-295.
-
(2008)
Fundamental Approaches to Software Engineering (FASE 2008), Held As Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2008)
, pp. 292-295
-
-
Jürjens, J.1
-
30
-
-
0003512056
-
-
Software Engineering Institute, Carnegie-Mellon University
-
K. Kang, S. Cohen, J.A. Hess, W.E. Novak, and S.A. Peterson Feature-Oriented Domain Analysis (FODA) Feasibility Study 1990 Software Engineering Institute, Carnegie-Mellon University
-
(1990)
Feature-Oriented Domain Analysis (FODA) Feasibility Study
-
-
Kang, K.1
Cohen, S.2
Hess, J.A.3
Novak, W.E.4
Peterson, S.A.5
-
38
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
F. Massacci, M. Prest, and N. Zannone Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation Computers Standards and Interfaces 2005 445 455
-
(2005)
Computers Standards and Interfaces
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
39
-
-
33750135439
-
Security requirements engineering for software systems: Case studies in support of software engineering education
-
N.R. Mead, E.D. Hough, Security requirements engineering for software systems: case studies in support of software engineering education, in: CSEE&T, 2006, pp. 149-158.
-
(2006)
CSEE&T
, pp. 149-158
-
-
Mead, N.R.1
Hough, E.D.2
-
40
-
-
33750131444
-
-
(CMU/SEI-2005-TR-009), Software Engineering Institute, Carnegie Mellon University, Pittsburgh (USA)
-
N.R. Mead, E. Hough, T. Stehney, Security Quality Requirements Engineering (SQUARE) Methodology, (CMU/SEI-2005-TR-009), Software Engineering Institute, Carnegie Mellon University, Pittsburgh (USA), 2005.
-
(2005)
Security Quality Requirements Engineering (SQUARE) Methodology
-
-
Mead, N.R.1
Hough, E.2
Stehney, T.3
-
41
-
-
33745912495
-
A comparative study of proposals for establishing security requirements for the development of secure information systems
-
Springer LNCS 3982
-
D. Mellado, E. Fernández-Medina, M. Piattini, A comparative study of proposals for establishing security requirements for the development of secure information systems, in: The 2006 International Conference on Computational Science and its Applications (ICCSA 2006), vol. 3, Springer LNCS 3982, 2006, pp. 1044-1053.
-
(2006)
The 2006 International Conference on Computational Science and Its Applications (ICCSA 2006)
, vol.3
, pp. 1044-1053
-
-
Mellado, D.1
-
42
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
D. Mellado, E. Fernández-Medina, and M. Piattini A common criteria based security requirements engineering process for the development of secure information systems Computer Standards and Interfaces 29 2 2007 244 253
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
45
-
-
44949241673
-
Towards security requirements management for software product lines: A security domain requirements engineering process
-
D. Mellado, E. Fernández-Medina, and M. Piattini Towards security requirements management for software product lines: a security domain requirements engineering process Computer Standards & Interfaces 30 2008 361 371
-
(2008)
Computer Standards & Interfaces
, vol.30
, pp. 361-371
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
46
-
-
77950516969
-
A systematic review of security requirements engineering
-
accessed02.02.10
-
D. Mellado, E. Fernández-Medina, M. Piattini, A systematic review of security requirements engineering, Computers Standards & Interfaces, 2010. < http://dx.doi.org/10.1016/j.csi.2010.01.006 > (accessed 02.02.10).
-
(2010)
Computers Standards & Interfaces
-
-
Mellado, D.1
-
48
-
-
34848888028
-
Capturing quality requirements of product family architecture
-
E. Niemelä, and A. Immonen Capturing quality requirements of product family architecture Information & Software Technology 2007 1107 1120
-
(2007)
Information & Software Technology
, pp. 1107-1120
-
-
Niemelä, E.1
Immonen, A.2
-
52
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
A.L. Opdahl, and G. Sindre Experimental comparison of attack trees and misuse cases for security threat identification Information and Software Technology 51 5 2010 916 932
-
(2010)
Information and Software Technology
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
54
-
-
5144226159
-
A customizable approach to full-life cycle variability management
-
Elsevier
-
K. Schmid, and I. John A customizable approach to full-life cycle variability management Science of Computer Programming vol. 53 2004 Elsevier 259 284
-
(2004)
Science of Computer Programming
, vol.53
, pp. 259-284
-
-
Schmid, K.1
John, I.2
-
57
-
-
77955412763
-
-
Pittsburgh (USA): Software Engineering Institute, Carnegie Mellon University
-
SEI, +SAFE, V1.2 A Safety Extension to CMMI-DEV V1.2. 2007, Pittsburgh (USA): Software Engineering Institute, Carnegie Mellon University.
-
(2007)
SEI, +SAFE, V1.2 A Safety Extension to CMMI-DEV V1.2
-
-
-
59
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering 10 1 2005 34 44
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
60
-
-
26444519009
-
COVAMOF: A framework for modeling variability in software product families
-
Boston, MA, USA
-
M. Sinnema, S. Deelstra, J. Nijhuis, J. Bosch, COVAMOF: a framework for modeling variability in software product families, in: Proc. of the Third Softw. Product Line Conf. (SPLC 2004), Boston, MA, USA, 2004.
-
(2004)
Proc. of the Third Softw. Product Line Conf. (SPLC 2004)
-
-
Sinnema, M.1
Deelstra, S.2
Nijhuis, J.3
Bosch, J.4
-
61
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
A. Toval, J. Nicolás, B. Moros, and F. García Requirements reuse for improving information systems security: a practitioner's approach Requirements Engineering 2002 205 219
-
(2002)
Requirements Engineering
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
|