-
1
-
-
84957011826
-
On the extension of UML with use case maps concepts
-
Amyot, D., Mussbacher, G. (2000) On the Extension of UML with Use Case Maps Concepts. Proc. UML 2000, pp 16-31.
-
(2000)
Proc. UML
, vol.2000
, pp. 16-31
-
-
Amyot, D.1
Mussbacher, G.2
-
2
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander I. (2003) Misuse Cases: Use Cases with Hostile Intent, IEEE Software, 20(1):58-66.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
3
-
-
78751516123
-
Attack patterns as a knowledge resource for building secure software
-
A. Sethi (ed.)
-
Barnum, S. (2007) Attack Patterns as a Knowledge Resource for Building Secure Software, In A. Sethi (ed.) Cigital: OMG Software Assurance WS
-
(2007)
Cigital: OMG Software Assurance WS
-
-
Barnum, S.1
-
4
-
-
0023287326
-
Towards a tool kit for the systems analyst
-
Benyon, D., Skidmore, S. (1987) Towards a Tool Kit For the Systems Analyst, The Computer Journal 30(l):2-7
-
(1987)
The Computer Journal
, vol.30
, Issue.1
, pp. 2-7
-
-
Benyon, D.1
Skidmore, S.2
-
7
-
-
78751507800
-
Correlated attack modeling (CAM)
-
Cheung, S., Lindqvist, U., Valdez, R. (2003) Correlated Attack Modeling (CAM), Final Technical Report by SRI International, October 2003
-
(2003)
Final Technical Report by SRI International October 2003
-
-
Cheung, S.1
Lindqvist, U.2
Valdez, R.3
-
8
-
-
85085406935
-
Matching attack patterns to security vulnerabilities in software- intensive system designs
-
Gegick, M., Williams, L., (2005) Matching attack patterns to security vulnerabilities in software- intensive system designs, Proc. SESS05 - building trustworthy applications, pp 1 -7
-
(2005)
Proc. SESS05 - Building Trustworthy Applications
, pp. 1-7
-
-
Gegick, M.1
Williams, L.2
-
9
-
-
78751550436
-
Web services enterprise security architecture: A case study
-
Fairfax, VA, USA
-
Gutierrez, C, Fernandez-Medina, E., Piattini, M. (2005a), Web services enterprise security architecture: a case study. Proc. WS on Secure Web Services (SWS'05), Fairfax, VA, USA.
-
(2005)
Proc. WS on Secure Web Services (SWS'05)
-
-
Gutierrez, C.1
Fernandez-Medina, E.2
Piattini, M.3
-
10
-
-
78651452980
-
Towards a process for web services security
-
Miami, Florida, USA
-
Gutierrez, C, Fernandez-Medina, E., Piattini, M. (2005b), Towards a Process for Web Services Security, Proc. WOSIS'05 at ICEIS'05, Miami, Florida, USA.
-
(2005)
Proc. WOSIS'05 at ICEIS'05
-
-
Gutierrez, C.1
Fernandez-Medina, E.2
Piattini, M.3
-
11
-
-
38949162568
-
PWSSec: Process for web services security
-
18-22
-
Gutierrez, C, Fernandez-Medina, E., Piattini, M. (2006), PWSSec: Process for Web Services Security, In Proc. ICWS '06, pp.213-222, 18-22
-
(2006)
Proc. ICWS '06
, pp. 213-222
-
-
Gutierrez, C.1
Fernandez-Medina, E.2
Piattini, M.3
-
13
-
-
77952386637
-
Suraksha: A security designers' workbench
-
Maurya, S., Jangam, E., Talukder, M., Pais, A.R. (2009) Suraksha: A security designers' workbench. Proc. Hack.in 2009, pp. 59-66.
-
(2009)
Proc. Hack. in 2009
, pp. 59-66
-
-
Maurya, S.1
Jangam, E.2
Talukder, M.3
Pais, A.R.4
-
14
-
-
85088409477
-
Security quality requirements engineering (SQUARE) methodology
-
St. Louis, MO, May 15-16, 2005
-
Mead, N.R, Stehney, T. (2005) Security Quality Requirements Engineering (SQUARE) Methodology. In Proc SESS'05. St. Louis, MO, May 15-16, 2005
-
(2005)
Proc SESS'05
-
-
Mead, N.R.1
Stehney, T.2
-
17
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Ning, P., Cui, Y., Reeves, D.S. (2002) Constructing attack scenarios through correlation of intrusion alerts. Proc. 9th ACM conf. on CCS, pp: 245-254
-
(2002)
Proc. 9th ACM Conf. on CCS
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
19
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
Opdahl A. L., Sindre, G. (2009) Experimental Comparison of Attack Trees and Misuse Cases for Security Threat Identification, Information and Software Technology, 51(5):916-932
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
21
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
May 12-15
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M. (2002) Automated Generation and Analysis of Attack Graphs, Proc. IEEE Symposium on Security and Privacy, p.273, May 12-15
-
(2002)
Proc. IEEE Symposium on Security and Privacy
, pp. 273
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
22
-
-
38149121542
-
Mai-activity diagrams for capturing attacks on business processes
-
Sindre, G. (2007). Mai-Activity Diagrams for Capturing Attacks on Business Processes. Lecture Notes in Computer Science, vol. 4542. pp 355-366
-
(2007)
Lecture Notes in Computer Science
, vol.4542
, pp. 355-366
-
-
Sindre, G.1
-
23
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl A.L. (2005). Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10(1): 34-44
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
24
-
-
13644271504
-
Generalization/specialization as a structuring mechanism for misuse cases
-
Sindre, G., Opdahl, A.L., Brevik, G.F. (2002) Generalization/ Specialization as a Structuring Mechanism for Misuse Cases. Proc. SREIS'2002.
-
(2002)
Proc. SREIS'2002
-
-
Sindre, G.1
Opdahl, A.L.2
Brevik, G.F.3
-
25
-
-
84879483035
-
The role of metamodels in federating system modelling techniques
-
Dallas, USA
-
Steele, P., Zaslavsky, A. (1993) The Role of Metamodels in Federating System Modelling Techniques, In Proc ER'93, Dallas, USA, pp 301-12
-
(1993)
Proc ER'93
, pp. 301-312
-
-
Steele, P.1
Zaslavsky, A.2
-
28
-
-
78751517161
-
Combining misuse cases with attack trees and security activity models
-
Tøndel, I.A., Jensen, J., Røstad, L. (2010) Combining misuse cases with attack trees and security activity models Proc. OSA workshop.
-
(2010)
Proc. OSA Workshop
-
-
Tøndel, I.A.1
Jensen, J.2
Røstad, L.3
|