-
4
-
-
13644252644
-
Eliciting Security Requirements with Misuse Cases
-
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10(1), 34-44 (2005)
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
5
-
-
80455138348
-
Illustrating Cyber Attacks with Misuse Case Maps
-
Accepted to
-
Karpati, P., Sindre, G., Opdahl, A.L.: Illustrating Cyber Attacks with Misuse Case Maps. Accepted to 16th International Working Conference on Requirements Engineering: Foundation for Software Quality, RefsQ 2010 (2010)
-
16th International Working Conference on Requirements Engineering: Foundation for Software Quality, RefsQ 2010 (2010)
-
-
Karpati, P.1
Sindre, G.2
Opdahl, A.L.3
-
7
-
-
84911353933
-
-
accessed 4.6.2010
-
Unified Modeling Language, http://www.uml.org (accessed 4.6.2010)
-
-
-
-
8
-
-
0010381933
-
-
accessed 22.6.2010
-
Internet Security Glossary,http://www.apps.ietf.org/rfc/rfc2828.html (accessed 22.6.2010)
-
Internet Security Glossary
-
-
-
9
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology 51(5), 916-932 (2009)
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
11
-
-
63149192862
-
A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems
-
Markose, S., Xiaoqing, L., McMillin, B.: A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 1, pp. 75-81 (2008)
-
(2008)
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
, vol.1
, pp. 75-81
-
-
Markose, S.1
Xiaoqing, L.2
McMillin, B.3
-
12
-
-
60849085437
-
An aspect-oriented methodology for designing secure applications
-
Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An aspect-oriented methodology for designing secure applications. Information and Software Technology 51, 846-864 (2009)
-
(2009)
Information and Software Technology
, vol.51
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
13
-
-
2942591545
-
-
Wiley, Chichester
-
Redmill, F., Chudleigh, M., Catmur, J.: Hazop and software Hazop. Wiley, Chichester (1999)
-
(1999)
Hazop and Software Hazop
-
-
Redmill, F.1
Chudleigh, M.2
Catmur, J.3
-
14
-
-
0003702671
-
-
IEC 61025: IEC Standard
-
IEC 61025: Fault tree analysis (FTA), IEC Standard (2006)
-
(2006)
Fault Tree Analysis (FTA)
-
-
-
17
-
-
84911351763
-
-
accessed 24.6.2010
-
Karpati, P.: http://www.idi.ntnu.no/~kpeter/ExampleSheet-Group1.pdf (accessed 24.6.2010)
-
-
-
Karpati, P.1
-
18
-
-
55249087535
-
Perceived usefulness, perceived ease of use and user acceptance of information technology
-
Davis, F.D.: Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly 13, 319-340 (1989)
-
(1989)
MIS Quarterly
, vol.13
, pp. 319-340
-
-
Davis, F.D.1
-
21
-
-
0003639957
-
-
Kluwer Academic, Norwell
-
Wohlin, C., Runeson, P., Höst, M., Ohlsson, M.C., Regnell, B., Wesslén, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic, Norwell (2000)
-
(2000)
Experimentation in Software Engineering: An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.C.4
Regnell, B.5
Wesslén, A.6
-
22
-
-
4344598248
-
Evaluating the effect of a delegated versus centralized control style on the maintainability of object-oriented software
-
Arisholm, E., Sjøberg, D.I.K.: Evaluating the effect of a delegated versus centralized control style on the maintainability of object-oriented software. IEEE Transactions on Software Engineering 30, 521-534 (2004)
-
(2004)
IEEE Transactions on Software Engineering
, vol.30
, pp. 521-534
-
-
Arisholm, E.1
Sjøberg, D.I.K.2
-
23
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: Toward a unified view. MIS Quarterly 27(3), 425-478 (2003)
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
|