-
2
-
-
80055012053
-
Security requirements -A field study of current practice
-
Paris, France
-
Wilander, J. & Gustavsson, J., "Security requirements -A field study of current practice", Symposium on Requirement Engineering for Information Security (SREIS ' 2005), Paris, France, 2005.
-
(2005)
Symposium on Requirement Engineering for Information Security (SREIS ' 2005)
-
-
Wilander, J.1
Gustavsson, J.2
-
3
-
-
84869272915
-
-
CERT
-
CERT, http://www.cert.org/stats/cert-stats.html.
-
-
-
-
4
-
-
0034291619
-
Handling Obstacles in Goal-Oriented Requirements Engineering
-
Oct
-
A. van Lamsweerde and E. Letier, "Handling Obstacles in Goal-Oriented Requirements Engineering", IEEE Transactions on Software Engineering, Special Issue on Exception Handling, Vol. 26 No. 10, Oct. 2000, 978-1005.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
5
-
-
50849153948
-
On understanding Laws, evolution and conversation in the large program lifecycle
-
Lehman M. M. "On understanding Laws, evolution and conversation in the large program lifecycle.", Journal of Software & Systems, vol. 1, pp. 213 - 221, 1980.
-
(1980)
Journal of Software & Systems
, vol.1
, pp. 213-221
-
-
Lehman, M.M.1
-
6
-
-
0033365246
-
A Software Model for Impact Analysis: A Validation Experiment
-
Oct
-
Cimitile, A.; Fasolino, A.R.; Visaggio, G. "A Software Model for Impact Analysis: A Validation Experiment", Proceedings of the Sixth Working Conference on Reverse Engineering, Oct. 1999, pg. 212-222.
-
(1999)
Proceedings of the Sixth Working Conference on Reverse Engineering
, pp. 212-222
-
-
Cimitile, A.1
Fasolino, A.R.2
Visaggio, G.3
-
8
-
-
63349091841
-
Goal-Oriented, B-Based, Formal Derivation of Security Design Specifications from Security Requirements
-
Barcelona, Spain
-
Abdel-Moneim, Riham, et. al., "Goal-Oriented, B-Based, Formal Derivation of Security Design Specifications from Security Requirements", Symposium on Requirements Engineering for Information Security, Barcelona, Spain, 2008.
-
(2008)
Symposium on Requirements Engineering for Information Security
-
-
Abdel-Moneim, R.1
et., al.2
-
10
-
-
17744386721
-
Using a Security Requirements Engineering Methodology in Practice: The Compliance with The Italian Data Protection Legislation
-
Massacci, Fabio, et. al., "Using a Security Requirements Engineering Methodology in Practice: The Compliance with The Italian Data Protection Legislation", Computer Standards & Interfaces, issue 27, pg. 445-455, 2005.
-
(2005)
Computer Standards & Interfaces
, Issue.27
, pp. 445-455
-
-
Massacci, F.1
et., al.2
-
11
-
-
0346964082
-
Foundations of the B Method
-
Cansell, Dominique and Méry, Dominique, "Foundations of the B Method", Proceedings of Computing and Informatics, vol. 22, pg. 1-31, 2003.
-
(2003)
Proceedings of Computing and Informatics
, vol.22
, pp. 1-31
-
-
Cansell, D.1
Méry, D.2
-
13
-
-
0033365246
-
A Software Model for Impact Analysis: A Validation Experiment
-
Oct
-
Cimitile, A.; Fasolino, A.R.; Visaggio, G. "A Software Model for Impact Analysis: A Validation Experiment", Proceedings of the Sixth Working Conference on Reverse Engineering, Oct. 1999, pg. 212-222.
-
(1999)
Proceedings of the Sixth Working Conference on Reverse Engineering
, pp. 212-222
-
-
Cimitile, A.1
Fasolino, A.R.2
Visaggio, G.3
-
15
-
-
0043024883
-
An Electronic Purse Specification, Refinement, and Proof
-
England, July
-
Stepney, Susan, Cooper, et. al., "An Electronic Purse Specification, Refinement, and Proof, Programming Research Group, Oxford University Computing Labarotory, England, July 2000.
-
(2000)
Programming Research Group, Oxford University Computing Labarotory
-
-
Stepney, S.1
Cooper2
et., al.3
|