-
1
-
-
52249118813
-
Querying UML models using OCL and prolog: A performance study
-
Lillehammer Norway, April
-
Chimiak-Opoka, J., Felderer, M., Lenz, C., & Lange, C. (2008). Querying UML Models using OCL and Prolog: A Performance Study. 2008 IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08), Lillehammer Norway, pp. 81-88, April.
-
(2008)
2008 IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08)
, pp. 81-88
-
-
Chimiak-Opoka, J.1
Felderer, M.2
Lenz, C.3
Lange, C.4
-
5
-
-
39449110065
-
Threat modeling: Diving into the deep end
-
January-February
-
Ingalsbe, J.A., Kunimatsu, L., Baeten, T., & Mead, N.R. (2008). Threat Modeling: Diving into the Deep End. IEEE Computer Software, Volume 25, Issue 1, pp. 28-34, January-February.
-
(2008)
IEEE Computer Software
, vol.25
, Issue.1
, pp. 28-34
-
-
Ingalsbe, J.A.1
Kunimatsu, L.2
Baeten, T.3
Mead, N.R.4
-
6
-
-
78651461931
-
-
(n.d.-A) Available as of July 31, 2009
-
Microsoft (n.d.-A). Microsoft's Threat Modeling Tool. Available as of July 31, 2009 at: http://www.microsoft.com/downloads/details.aspx7FamilyID= 62830f95-0e61-4f87-88a6-e7c663444acl& displaylang=en.
-
Microsoft's Threat Modeling Tool.
-
-
-
7
-
-
78651464439
-
-
n.d.-B Available as of July 31, 2009 at
-
Microsoft (n.d.-B). Microsoft Threat Analysis and Modeling v2.1.2. Available as of July 31, 2009 at: http://www.microsoft.com/downloads/details. aspx7FamilyId=59888078-9DAF-4E96-B7D1-944703479451&displaylang=en
-
Microsoft Threat Analysis and Modeling V2.1.2
-
-
-
8
-
-
78651460183
-
-
(n.d.) Available as of July 31, 2009 at
-
No Magic (n.d.). MagicDraw UML 16.0. Available as of July 31, 2009 at: http://www.nomagic.com/
-
MagicDraw UML 16.0
-
-
-
9
-
-
78651444078
-
-
Object Management Group (n.d.-A). UML. Available as of July 31, 2009 at
-
Object Management Group (n.d.-A). UML. Available as of July 31, 2009 at: http://www.omg.org/
-
-
-
-
10
-
-
78651424325
-
-
Object Management Group (n.d.-B). XMI. Available as of July 31, 2009 at
-
Object Management Group (n.d.-B). XMI. Available as of July 31, 2009 at: http://www.omg.org/technology/xml/index.htm.
-
-
-
-
11
-
-
84956994446
-
Checking general safety criteria on UML statecharts
-
Springer-Verlag
-
Pap, Z., Majzik, I., & Pataricza, A. (2001). Checking General Safety Criteria on UML Statecharts. In Lecture Notes in Computer Science, Vol. 2187, pp. 46-55, Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2187
, pp. 46-55
-
-
Pap, Z.1
Majzik, I.2
Pataricza, A.3
-
12
-
-
84907303035
-
-
(n.d.) Available as of July 31, 2009 at
-
PTA Technologies (n.d.). Practical Threat Analysis. Available as of July 31, 2009 at: http://www.ptatechnologies.com/
-
Practical Threat Analysis
-
-
-
13
-
-
34748879040
-
-
July 13. Available as of July 31, 2009 at
-
Saitta, P., Larcom, B., & Eddington, M. (2005). Trike v.1 Methodology Document [Draft], July 13. Available as of July 31, 2009 at: http://www.octotrike.org/papers/Trike-v1-Methodology-Document-draft.pdf.
-
(2005)
Trike V.1 Methodology Document [Draft]
-
-
Saitta, P.1
Larcom, B.2
Eddington, M.3
-
14
-
-
85020200328
-
Toward a secure system engineering methodology
-
Charlottsville, VA, USA, September
-
Salter, C., Saydjari, O.S., Schneier, B., Wallner, J. (1998). Toward a Secure System Engineering Methodology. In Proceedings of New Security Paradigms Workshop, Charlottsville, VA, USA, pp. 2-10, September.
-
(1998)
Proceedings of New Security Paradigms Workshop
, pp. 2-10
-
-
Salter, C.1
Saydjari, O.S.2
Schneier, B.3
Wallner, J.4
-
16
-
-
84886774759
-
-
(n.d.) Available as of July 31, 2009 at
-
SWI-Prolog (n.d.). SWI-Prolog. Available as of July 31, 2009 at: http://www.swi-prolog.org/
-
SWI-Prolog
-
-
-
17
-
-
38549099196
-
A threat model driven approach for security testing
-
Minneapolis, MN, USA, May
-
Wang, L., Wong, E., & Xu, D. (2007). A Threat Model Driven Approach for Security Testing. In Proceedings of the third IEEE Computer Society International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, MN, USA, pp. 10-16, May.
-
(2007)
Proceedings of the Third IEEE Computer Society International Workshop on Software Engineering for Secure Systems (SESS)
, pp. 10-16
-
-
Wang, L.1
Wong, E.2
Xu, D.3
-
18
-
-
52249097319
-
-
NRC Institute for Information Technology, National Research Council Canada, NRCC# 48478, NPArC# 8914119, March. Available as of July 29, 2009 at
-
Yee, G. (2006). Recent research in secure software. NRC Institute for Information Technology, National Research Council Canada, NRCC# 48478, NPArC# 8914119, March. Available as of July 29, 2009 at: http://nparc.cisti-icist. nrccnrc.gc.ca/npsi/ctrl?action=shwart&index=an&req=8914119&lang=en
-
(2006)
Recent Research in Secure Software
-
-
Yee, G.1
-
19
-
-
46849107129
-
Visual analysis of privacy risks in web services
-
Salt Lake City, UT, USA, July
-
Yee, G. (2007). Visual Analysis of Privacy Risks in Web Services. In Proceedings of the IEEE International Conference on Web Service 2007 (ICWS 2007), Salt Lake City, UT, USA, pp. 671-678, July.
-
(2007)
Proceedings of the IEEE International Conference on Web Service 2007 (ICWS 2007)
, pp. 671-678
-
-
Yee, G.1
|