-
3
-
-
70449097155
-
Web Services Security: Is the problem solved?
-
Gutiérrez, C, E. Fernández-Medina, and M. Piattini, Web Services Security: is the problem solved? Information Systems Security, 2004. 13(3): p. 22-31.
-
(2004)
Information Systems Security
, vol.13
, Issue.3
, pp. 22-31
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
7
-
-
78651418385
-
Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework, version 1.0
-
Carnegie Mellon. Software Engineering Institute
-
Alberts, C.J., et al., Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0, in Networked Systems Survivability Program. 1999, Carnegie Mellon. Software Engineering Institute, p. 84.
-
(1999)
Networked Systems Survivability Program
, pp. 84
-
-
Alberts, C.J.1
-
10
-
-
78651453649
-
Architecture based development
-
April Carnegie Mellon. Software Engineering Institute
-
Bass, L. and R. Kazman, Architecture Based Development, in Product Line Systems. April 1999, Carnegie Mellon. Software Engineering Institute, p. 36.
-
(1999)
Product Line Systems
, pp. 36
-
-
Bass, L.1
Kazman, R.2
-
14
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander, I., Misuse Cases: Use Cases with Hostile Intent. IEEE Computer Software, 2003. 20(1): p. 58-66.
-
(2003)
IEEE Computer Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
16
-
-
17844409254
-
Requirements reuse for improving information systems security: A practitioner's approach
-
Toval, A., et al., Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. Requirements Engineering Journal, 2001. 6(4): p. 205-219.
-
(2001)
Requirements Engineering Journal
, vol.6
, Issue.4
, pp. 205-219
-
-
Toval, A.1
-
17
-
-
0004025223
-
-
2nd, ed. Addison-Wesley.
-
Bass, L., P. Clements, and R. Kazman, Software Architecture in Practice. 2nd, ed. 2003: Addison-Wesley. 560.
-
(2003)
Software Architecture in Practice
, pp. 560
-
-
Bass, L.1
Clements, P.2
Kazman, R.3
-
19
-
-
78651465752
-
Attribute-based architectural styles
-
Software Engineering Institute
-
Klein, M. and R. Kazman, Attribute-Based Architectural Styles, in Product Line Practice. 1999, Software Engineering Institute, p. 90.
-
(1999)
Product Line Practice
, pp. 90
-
-
Klein, M.1
Kazman, R.2
-
20
-
-
0029408391
-
The 4+1 view model of software architecture
-
Krutchen, P., The 4+1 View Model of Software Architecture. IEEE Software, 1995: p. 42-50.
-
(1995)
IEEE Software
, pp. 42-50
-
-
Krutchen, P.1
-
23
-
-
3543129528
-
A XML-based approach to combine firewalls and web services security specifications
-
Fairfaz VA, USA.
-
Cremonini, M., et al. A XML-based Approach to Combine Firewalls and Web Services Security Specifications, in ACM Workshop on XML Security. 2003. Fairfaz VA, USA.
-
(2003)
ACM Workshop on XML Security
-
-
Cremonini, M.1
-
24
-
-
38949154073
-
Specification and querying of security constraints in the EFSOC framework
-
Willem-Jan van den Heuvel. New York City, USA.
-
Leune, K. and M. Papazaglou. Specification and Querying of Security Constraints in the EFSOC Framework, in International Conference on Service Oriented Computing. Willem-Jan van den Heuvel. New York City, USA.
-
International Conference on Service Oriented Computing
-
-
Leune, K.1
Papazaglou, M.2
-
25
-
-
20444440807
-
Sound development of secure service-based systems
-
New York, USA: ACM.
-
Deubler, M., et al. Sound Development of Secure Service-based Systems, in ICSOC04. 2004. New York, USA: ACM.
-
(2004)
ICSOC04
-
-
Deubler, M.1
|