-
1
-
-
0037240812
-
Misuse cases: use cases with hostile intent
-
Alexander, I. (2003) ‘Misuse cases: use cases with hostile intent’, IEEE Software, Vol. 20, pp.58–66.
-
(2003)
IEEE Software
, vol.20
, pp. 58-66
-
-
Alexander, I.1
-
3
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
Anton, A.I. and Earp, J.B. (2004) ‘A requirements taxonomy for reducing web site privacy vulnerabilities’, Requirements Engineering, Vol. 9, No. 3, pp.169–185.
-
(2004)
Requirements Engineering
, vol.9
, Issue.3
, pp. 169-185
-
-
Anton, A.I.1
Earp, J.B.2
-
5
-
-
3142750497
-
TROPOS: an agent-oriented software development methodology
-
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J. and Perin, A. (2004) ‘TROPOS: an agent-oriented software development methodology’, Journal of Autonomous Agents and Multi-Agent Systems, Vol. 8, No. 3, pp.203–236.
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perin, A.5
-
6
-
-
0024663219
-
The Chinese wall security policy
-
1–3 May 1989, Oakland, California
-
Brewer, D.F.C. and Nash, M.J. (1989) ‘The Chinese wall security policy’, Proceedings of the IEEE Symposium on Research in Security and Privacy, 1–3 May 1989, Oakland, California. pp.206–214.
-
(1989)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
9
-
-
0141733117
-
Modelling access policies using roles in requirements engineering
-
Crook, R., Ince, D. and Nuseibeh, B. (2003) ‘Modelling access policies using roles in requirements engineering’, Information and Software Technology, Vol. 45, No. 14, pp.979–991.
-
(2003)
Information and Software Technology
, vol.45
, Issue.14
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
11
-
-
0002410051
-
-
2nd edition, Norwalk, CT: Appleton & Lange
-
Doheny, M.O., Cook, C. and Stopper, M. (1987) The Discipline of Nursing: An Introduction, 2nd edition, Norwalk, CT: Appleton & Lange.
-
(1987)
The Discipline of Nursing: An Introduction
-
-
Doheny, M.O.1
Cook, C.2
Stopper, M.3
-
14
-
-
2942757657
-
Engineering security requirements
-
Firesmith, D.G. (2003) ‘Engineering security requirements’, Journal of Object Technology, Vol. 2, No. 1.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
-
-
Firesmith, D.G.1
-
15
-
-
0142156745
-
Requirements engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard
-
LNCS 2813 Springer-Verlag
-
Giorgini, P., Massacci, F. and Mylopoulos, J. (2003) ‘Requirements engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard’, Proceedings of the International Conference on Conceptual Modelling (ER), LNCS 2813, pp.263–276, Springer-Verlag.
-
(2003)
Proceedings of the International Conference on Conceptual Modelling (ER)
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
16
-
-
35048857793
-
Filling the gap between requirements engineering and public key/trust management infrastructures
-
S.K. Katsikas, S. Gritzalis and J. Lopez (Eds) Samos Island, Greece, 25–26 June
-
Giorgini, P., Massacci, F., Mylopoulos, J. and Zannone, N. (2004) ‘Filling the gap between requirements engineering and public key/trust management infrastructures’, in S.K. Katsikas, S. Gritzalis and J. Lopez (Eds). Public Key Infrastructure, LNCS 3093 Springer, Proceedings of the First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, 25–26 June.
-
(2004)
Public Key Infrastructure, LNCS 3093 Springer, Proceedings of the First European PKIWorkshop: Research and Applications, EuroPKI 2004
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
19
-
-
79953329648
-
Modeling conversation policies using permissions and obligations, in developments in agent communication
-
F. Dignum, R. van Eijk and M-P. Huget (Eds) Springer-Verlag, LNCS
-
Kagal, L. and Finin, T. (2005) ‘Modeling conversation policies using permissions and obligations, in developments in agent communication’, F. Dignum, R. van Eijk and M-P. Huget (Eds). Post-Proceedings of the AAMAS Workshop on Agent Communication, Springer-Verlag, LNCS.
-
(2005)
Post-Proceedings of the AAMAS Workshop on Agent Communication
-
-
Kagal, L.1
Finin, T.2
-
20
-
-
0019107087
-
MIS research: reference disciplines and cumulative tradition
-
Philadelphia, PA, December
-
Keen, P.G.W. (1980) ‘MIS research: reference disciplines and cumulative tradition’, Proceedings of the First International Conference on Information Systems, Philadelphia, PA, December, pp.9–18.
-
(1980)
Proceedings of the First International Conference on Information Systems
, pp. 9-18
-
-
Keen, P.G.W.1
-
22
-
-
78751509068
-
Enterprise engineering: a discipline?
-
June
-
Liles, D.H., Johnson, M.E., Meade, L.M. and Underdown, D.R. (1995) ‘Enterprise engineering: a discipline?’ Proceedings of the Society for Enterprise Engineering Conference, June.
-
(1995)
Proceedings of the Society for Enterprise Engineering Conference
-
-
Liles, D.H.1
Johnson, M.E.2
Meade, L.M.3
Underdown, D.R.4
-
23
-
-
17044370046
-
Analysing security threats and vulnerabilities using abuse frames
-
The Open University
-
Lin, L.C., Nuseibeh, B., Ince, D., Jackson, M. and Moffett, J. (2003) ‘Analysing security threats and vulnerabilities using abuse frames’, Technical Report 2003/10, The Open University.
-
(2003)
Technical Report 2003/10
-
-
Lin, L.C.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
24
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
IEEE Press
-
Liu, L., Yu, E. and Mylopoulos, J. (2003) ‘Security and privacy requirements analysis within a social setting’, Proceedings of the 11th International Requirements Engineering Conference, IEEE Press, pp.151–161.
-
(2003)
Proceedings of the 11th International Requirements Engineering Conference
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
25
-
-
79955143136
-
Secure UML: a UML-based modelling language for model-driven security
-
Springer-Verlag
-
Lodderstedt, T., Basin, D. and Doser, J. (2002) Secure UML: a UML-based modelling language for model-driven security’, Proceedings of the UML’02, LNCS 2460, Springer-Verlag, pp.426–441.
-
(2002)
Proceedings of the UML’02, LNCS 2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
30
-
-
8444240069
-
Using security attack scenarios to analyse security during information systems design
-
April, Porto-Portugal
-
Mouratidis, H., Giorgini, P. and Manson, G. (2004b) ‘Using security attack scenarios to analyse security during information systems design’, Proceedings of the International Conference on Enterprise Information Systems (ICEIS 2004), April, Porto-Portugal, pp.10–17.
-
(2004)
Proceedings of the International Conference on Enterprise Information Systems (ICEIS 2004)
, pp. 10-17
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
31
-
-
23944475544
-
When security meets software engineering: a case of modelling secure information systems
-
Mouratidis, H., Giorgini, P. and Manson, G. (2005) ‘When security meets software engineering: a case of modelling secure information systems’, Information Systems, Vol. 30, No. 8, pp.609–629.
-
(2005)
Information Systems
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
32
-
-
33646184981
-
Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems
-
Springer-Verlag
-
Mouratidis, H., Weiss, M. and Giorgini, P. (2005c) ‘Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems’, Proceedings of the 24th International Conference on Conceptual Modelling (ER), Lecture Notes in Computer Science, Vol. 3716, pp.225–240, Springer-Verlag.
-
(2005)
Proceedings of the 24th International Conference on Conceptual Modelling (ER), Lecture Notes in Computer Science
, vol.3716
, pp. 225-240
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
33
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J. and Schroeder, M.D. (1975) ‘The protection of information in computer systems’, Proceedings of the IEEE, Vol. 63, No. 9, pp.1278–1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.D.2
-
36
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G. and Opdahl, A.L. (2005) ‘Eliciting security requirements with misuse cases’, Requirements Engineering, Vol. 10, No. 1, pp.34–44.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
38
-
-
8344261752
-
Modelling computer attacks: a target-centric ontology for intrusion-detection
-
Undercoffer, J. and Pinkston, J. (2002) ‘Modelling computer attacks: a target-centric ontology for intrusion-detection’, Proceedings of the CADIP Research Symposium, Available at: http://www.cs.umbc.edu/cadip/2002Symposium/.
-
(2002)
Proceedings of the CADIP Research Symposium
-
-
Undercoffer, J.1
Pinkston, J.2
-
39
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
Edinburgh, May, ACM-IEEE
-
Van Lamsweerde, A. (2004) ‘Elaborating security requirements by construction of intentional anti-models’, Proceedings of the 26th International Conference on Software Engineering, Edinburgh, May, ACM-IEEE, pp.148–157.
-
(2004)
Proceedings of the 26th International Conference on Software Engineering
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
40
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
Van Lamsweerde, A. and Letier, E. (2000) ‘Handling obstacles in goal-oriented requirements engineering’, Transactions of Software Engineering, Vol. 26, No. 10, pp.978–1005.
-
(2000)
Transactions of Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
43
-
-
84949689154
-
-
An extensive presentation and discussion of these models are out of the scope of this chapter and this book
-
An extensive presentation and discussion of these models are out of the scope of this chapter and this book.
-
-
-
|