-
1
-
-
0037240812
-
Misuse Cases: Use Cases with Hostile Intent
-
[Alexander (2003)]
-
[Alexander (2003)] Alexander, I., Misuse Cases: Use Cases with Hostile Intent. IEEE Software, (2003): p. 58-66.
-
(2003)
IEEE Software
, pp. 58-66
-
-
Alexander, I.1
-
2
-
-
27644438149
-
-
[Alexander and Maiden (2004)], John Wiley & Sons
-
[Alexander and Maiden (2004)] Alexander, I. and N. Maiden, Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle. (2004): John Wiley & Sons. [Artelsmair and Wagner (2003)] Artelsmair, C. and R. Wagner. Towards a Security
-
(2004)
Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle
-
-
Alexander, I.1
Maiden, N.2
-
3
-
-
33750059814
-
Towards a Security Engineering Process
-
[Artelsmair and Wagner (2003)], in The 7th World Multiconference on Systemics, Orlando, Florida, USA
-
[Artelsmair and Wagner (2003)] Artelsmair, C. and R. Wagner. Towards a Security Engineering Process. in The 7th World Multiconference on Systemics, Cybernetics and Informatics. (2003). Orlando, Florida, USA.
-
(2003)
Cybernetics and Informatics
-
-
Artelsmair, C.1
Wagner, R.2
-
4
-
-
33646204176
-
-
[Bass, Bachmann et al. (2004)], SEI
-
[Bass, Bachmann et al. (2004)] Bass, L., F. Bachmann, R.J. Ellison, A.P. Moore, and M. Klein, Security and survivability reasoning frameworks and architectural design tactics. SEI, (2004).
-
(2004)
Security and survivability reasoning frameworks and architectural design tactics
-
-
Bass, L.1
Bachmann, R.J.2
Ellison, A.P.3
Moore, F.4
Klein, M.5
-
5
-
-
78650279892
-
-
[Bradford, Grizzell et al. (2007)], Cap. 4., A. Publications, Editor., The University of Alabama, Tuscaloosa, USA
-
[Bradford, Grizzell et al. (2007)] Bradford, P.G., B.M. Grizzell, G.T. Jay, and J.T. Jenkins, Cap. 4. Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor. (2007): The University of Alabama, Tuscaloosa, USA. p. 440.
-
(2007)
Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing
, pp. 440
-
-
Bradford, P.G.1
Grizzell, G.T.2
Jay, B.M.3
Jenkins, J.T.4
-
6
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
[Breu, Burger et al. (2003)], in
-
[Breu, Burger et al. (2003)] Breu, R., K. Burger, M. Hafner, J. Jürjens, G. Popp, V. Lotz, and G.Wimmel. Key issues of a formally based process model for security engineering. in International Conference on Software and Systems Engineering and their Applications. (2003).
-
(2003)
International Conference on Software and Systems Engineering and their Applications
-
-
Breu, R.1
Burger, M.2
Hafner, J.3
Jürjens, G.4
Popp, V.5
Lotz, K.6
Wimmel, G.7
-
7
-
-
33845456982
-
Scheduling In The Grid Application Development Software Project
-
[Dail, Sievert et al. (2004)], in
-
[Dail, Sievert et al. (2004)] Dail, H., O. Sievert, F. Berman, H. Casanova, A. YarKhan, S. Vadhiyar, J. Dongarra, C. Liu, L. Yang, D. Angulo, and I. Foster, Scheduling In The Grid Application Development Software Project, in Grid resource management:state of the art and future trends. (2004). p. 73-98.
-
(2004)
Grid resource management: State of the art and future trends
, pp. 73-98
-
-
Dail, H.1
Sievert, F.2
Berman, H.3
Casanova, A.4
Yar Khan, S.5
Vadhiyar, J.6
Dongarra, C.7
Liu, L.8
Yang, D.9
Angulo, O.10
Foster, I.11
-
11
-
-
42749098120
-
A Grid Service Infrastructure for Mobile Devices
-
[Guan, Zaluska et al. (2005)], in, Beijing, China
-
[Guan, Zaluska et al. (2005)] Guan, T., E. Zaluska, and D.D. Roure. A Grid Service Infrastructure for Mobile Devices. in First International Conference on Semantics, Knowledge, an Grid (SKG 2005). (2005). Beijing, China.
-
(2005)
First International Conference on Semantics, Knowledge, an Grid (SKG 2005)
-
-
Guan, T.1
Zaluska, E.2
Roure, D.D.3
-
12
-
-
34548176547
-
A framework for security requirements engineering
-
[Haley, Moffet et al. (2006)], in, Shangai, China
-
[Haley, Moffet et al. (2006)] Haley, C.B., J.D. Moffet, R. Laney, and B. Nuseibeh. A framework for security requirements engineering. in Software Engineering for Secure Systems Workshop. (2006). Shangai, China.
-
(2006)
Software Engineering for Secure Systems Workshop
-
-
Haley, C.B.1
Moffet, R.2
Laney, J.D.3
Nuseibeh, B.4
-
13
-
-
33646765853
-
Mobile-To- Grid Middleware: Bridging the gap between mobile and Grid environments
-
[Jameel, Kalim et al. (2005)], in, Amsterdam, The Netherlands: Springer
-
[Jameel, Kalim et al. (2005)] Jameel, H., U. Kalim, A. Sajjad, S. Lee, and T. Jeon. Mobile-To- Grid Middleware: Bridging the gap between mobile and Grid environments. in European Grid Conference EGC 2005. (2005). Amsterdam, The Netherlands: Springer.
-
(2005)
European Grid Conference EGC 2005
-
-
Jameel, H.1
Kalim, A.2
Sajjad, S.3
Lee, U.4
Jeon, T.5
-
15
-
-
33644965870
-
Grid Interactive Serviceoriented Programming Environment
-
[Kolonay and Sobolewski (2004)], in, Tsinghua, China: Press and Springer Verlag
-
[Kolonay and Sobolewski (2004)] Kolonay, R. and M. Sobolewski. Grid Interactive Serviceoriented Programming Environment. in Concurrent Engineering: The Worldwide Engineering Grid. (2004). Tsinghua, China: Press and Springer Verlag.
-
(2004)
Concurrent Engineering: The Worldwide Engineering Grid
-
-
Kolonay, R.1
Sobolewski, M.2
-
16
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
[Lodderstedt, Basin et al. (2002)], in, Dresden, Germany: Springer
-
[Lodderstedt, Basin et al. (2002)] Lodderstedt, T., D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. in 5th International Conference on the Unified Modeling Language (UML), 2002. (2002). Dresden, Germany: Springer.
-
(2002)
5th International Conference on the Unified Modeling Language (UML), 2002
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
20
-
-
67650301844
-
USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework
-
[Park (2009)]
-
[Park (2009)] Park, J.H., USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework. Journal of Universal Computer Science (J.UCS), (2009). 15(5): p. 1065- 1080.
-
(2009)
Journal of Universal Computer Science (J.UCS)
, vol.15
, Issue.5
, pp. 1065-1080
-
-
Park, J.H.1
-
21
-
-
78650487448
-
Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application
-
[Rosado, Fernández-Medina et al. (2009a)], in, ER 2009., Gramado, Brasil: LNCS 5833
-
[Rosado, Fernández-Medina et al. (2009a)] Rosado, D.G., E. Fernández-Medina, and J. López. Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application. in 5th International Workshop on Foundations and Practices of UML, in conjunction with the 28th International Conference on Conceptual Modelling, ER 2009. (2009a). Gramado, Brasil: LNCS 5833.
-
(2009)
5th International Workshop on Foundations and Practices of UML, in conjunction with the 28th International Conference on Conceptual Modelling
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
22
-
-
77949488225
-
Obtaining Security Requirements for a Mobile Grid System
-
[Rosado, Fernández-Medina et al. (2009b)]
-
[Rosado, Fernández-Medina et al. (2009b)] Rosado, D.G., E. Fernández-Medina, and J. López, Obtaining Security Requirements for a Mobile Grid System. International Journal of Grid and High Performance Computing, (2009b). 1(3): p. 1-17.
-
(2009)
International Journal of Grid and High Performance Computing
, vol.1
, Issue.3
, pp. 1-17
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
23
-
-
70349918315
-
Reusable Security Use Cases for Mobile Grid environments
-
[Rosado, Fernández-Medina et al. (2009c)], in, Vancouver, Canada
-
[Rosado, Fernández-Medina et al. (2009c)] Rosado, D.G., E. Fernández-Medina, and J. López. Reusable Security Use Cases for Mobile Grid environments. in Workshop on Software Engineering for Secure Systems, in conjunction with the 31st International Conference on Software Engineering. (2009c). Vancouver, Canada.
-
(2009)
Workshop on Software Engineering for Secure Systems, in conjunction with the 31st International Conference on Software Engineering
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
24
-
-
79952574576
-
Security Services Architecture for Secure Mobile Grid Systems
-
[Rosado, Fernández-Medina et al. (2010a)], Special Issue on Security and Dependability Assurance of Software Architectures
-
[Rosado, Fernández-Medina et al. (2010a)] Rosado, D.G., E. Fernández-Medina, and J. López, Security Services Architecture for Secure Mobile Grid Systems. Journal of Systems Architecture. Special Issue on Security and Dependability Assurance of Software Architectures, (2010a).
-
(2010)
Journal of Systems Architecture
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
25
-
-
57649240533
-
Engineering Process Based On Grid Use Cases For Mobile Grid Systems
-
[Rosado, Fernández-Medina et al. (2008a)], in, Porto, Portugal
-
[Rosado, Fernández-Medina et al. (2008a)] Rosado, D.G., E. Fernández-Medina, J. López, and M. Piattini. Engineering Process Based On Grid Use Cases For Mobile Grid Systems. in The Third International Conference on Software and Data Technologies- ICSOFT 2008. (2008a). Porto, Portugal.
-
(2008)
The Third International Conference on Software and Data Technologies- ICSOFT 2008
-
-
Rosado, D.G.1
Fernández-Medina J.López, E.2
Piattini, M.3
-
26
-
-
49049090612
-
PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices
-
[Rosado, Fernández-Medina et al. (2008b)], in, Barcelona, Spain: IEEE Computer Society
-
[Rosado, Fernández-Medina et al. (2008b)] Rosado, D.G., E. Fernández-Medina, J. López, and M. Piattini. PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices. in International Conference on Availability, Reliability and Security (ARES 2008). (2008b). Barcelona, Spain: IEEE Computer Society.
-
(2008)
International Conference on Availability, Reliability and Security (ARES 2008)
-
-
Rosado, D.G.1
Fernández-Medina J.López, E.2
Piattini, M.3
-
27
-
-
77949490964
-
Analysis of Secure Mobile Grid Systems: A Systematic Approach
-
[Rosado, Fernández-Medina et al. (2010b)]
-
[Rosado, Fernández-Medina et al. (2010b)] Rosado, D.G., E. Fernández-Medina, J. López, and M. Piattini, Analysis of Secure Mobile Grid Systems: A Systematic Approach. Information and Software Technology, (2010b). 52: p. 517-536.
-
(2010)
Information and Software Technology
, vol.52
, pp. 517-536
-
-
Rosado, D.G.1
Fernández-Medina J.López, E.2
Piattini, M.3
-
28
-
-
33750441515
-
Security Patterns and Requirements for Internet-based Applications
-
[Rosado, Gutiérrez et al. (2006)]
-
[Rosado, Gutiérrez et al. (2006)] Rosado, D.G., C. Gutiérrez, E. Fernandez-Medina, and M. Piattini, Security Patterns and Requirements for Internet-based Applications. Internet Research, (2006). 16(5): p. 519-536.
-
(2006)
Internet Research
, vol.16
, Issue.5
, pp. 519-536
-
-
Rosado, D.G.1
Gutiérrez, E.2
Fernandez-Medina, C.3
Piattini, M.4
-
30
-
-
58149107875
-
Capturing Security Requirements by Misuse Cases
-
[Sindre and Opdahl (2001)], in, Tromsø, Norway
-
[Sindre and Opdahl (2001)] Sindre, G. and A.L. Opdahl. Capturing Security Requirements by Misuse Cases. in 14th Norwegian Informatics Conference (NIK'2001). (2001). Tromsø, Norway.
-
(2001)
14th Norwegian Informatics Conference (NIK'2001)
-
-
Sindre, G.1
Opdahl, A.L.2
-
32
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
[Sindre and Opdahl (2005)]
-
[Sindre and Opdahl (2005)] Sindre, G. and A.L. Opdahl, Eliciting security requirements with misuse cases. Requirements Engineering Journal, (2005). 10(1): p. 34-44.
-
(2005)
Requirements Engineering Journal
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
33
-
-
0005505737
-
-
[WAP Forum (2001)] WAP Forum, Available from
-
[WAP Forum (2001)] WAP Forum. Wireless Transport Layer Security specification. 2001; Available from: http://www.openmobilealliance.org/tech/affiliates/wap/wap-261-wtls- 20010406-a.pdf.
-
(2001)
Wireless Transport Layer Security specification
-
-
|