메뉴 건너뛰기




Volumn 6409 LNCS, Issue , 2010, Pages 111-118

The secret lives of assumptions: Developing and refining assumption personas for secure system design

Author keywords

[No Author keywords available]

Indexed keywords

BOUNDARY OBJECTS; SECURE SYSTEM;

EID: 78650244028     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16488-0_9     Document Type: Conference Paper
Times cited : (22)

References (15)
  • 1
    • 78650230878 scopus 로고    scopus 로고
    • web site
    • CAIRIS web site, http://www.comlab.ox.ac.uk/cairis
    • CAIRIS
  • 8
  • 11
    • 84899251780 scopus 로고    scopus 로고
    • Arguing satisfaction of security requirements
    • Mouratidis, H., Giorgini, P. (eds.) ch. 2, Idea Group, USA
    • Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Arguing satisfaction of security requirements. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering, ch. 2, pp. 16-43. Idea Group, USA (2007)
    • (2007) Integrating Security and Software Engineering , pp. 16-43
    • Haley, C.B.1    Laney, R.2    Moffett, J.D.3    Nuseibeh, B.4
  • 13
    • 70349464375 scopus 로고    scopus 로고
    • Securing the skies: In requirements we trust
    • Nuseibeh, B., Haley, C., Foster, C.: Securing the skies: In requirements we trust. Computer 42(9), 64-72 (2009)
    • (2009) Computer , vol.42 , Issue.9 , pp. 64-72
    • Nuseibeh, B.1    Haley, C.2    Foster, C.3
  • 15
    • 84924180488 scopus 로고    scopus 로고
    • Cambridge University Press, Cambridge updated edn.
    • Toulmin, S.: The uses of argument. Cambridge University Press, Cambridge (2003) (updated edn.)
    • (2003) The Uses of Argument
    • Toulmin, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.