-
1
-
-
33746338083
-
-
version 1.0
-
Alberts, C., Dorofee, A., Stevens, J., Woody, C.: OCTAVE®-S implementation guide, version 1.0 (2005), http://www.sei.cmu.edu/reports/ 04hb003.pdf
-
(2005)
OCTAVE®-S Implementation Guide
-
-
Alberts, C.1
Dorofee, A.2
Stevens, J.3
Woody, C.4
-
3
-
-
79551547936
-
-
Tech. Rep. TR 03126-4, Bundesamt für Sicherheit in der Informationstechnik
-
Bartels, C., Kelter, H., Oberweis, R., Rosenberg, B.: Technical guidelines for the secure use of RFID - application area trade logistics. Tech. Rep. TR 03126-4, Bundesamt für Sicherheit in der Informationstechnik (2009)
-
(2009)
Technical Guidelines for the Secure Use of RFID - Application Area Trade Logistics
-
-
Bartels, C.1
Kelter, H.2
Oberweis, R.3
Rosenberg, B.4
-
4
-
-
79551558962
-
Supporting agile development of authorization rules for SME applications
-
Bertino, E., Joshi, J.B.D. (eds.) CollaborateCom 2008. Springer, Heidelberg
-
Bartsch, S., Sohr, K., Bormann, C.: Supporting agile development of authorization rules for SME applications. In: Bertino, E., Joshi, J.B.D. (eds.) CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 10, pp. 461-471. Springer, Heidelberg (2009)
-
(2009)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.10
, pp. 461-471
-
-
Bartsch, S.1
Sohr, K.2
Bormann, C.3
-
5
-
-
60849104397
-
Automated analysis of security-design models
-
Basin, D., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Information and Software Technology 51(5), 815-831 (2009)
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
6
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
7
-
-
33947368645
-
Model-based security analysis in seven steps - A guided tour to the CORAS method
-
DOI 10.1007/s10550-007-0013-9
-
den Braber, F., Hogganvik, I., Lund, M., Stølen, K., Vraalsen, F.: Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technology Journal 25(1), 101-117 (2007) (Pubitemid 46455705)
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
Den, B.F.1
Hogganvik, I.2
Lund, M.S.3
Stolen, K.4
Vraalsen, F.5
-
8
-
-
77956247296
-
-
Bundesamt für Sicherheit in der Informationstechnik: BSI-Standard 100-2: IT-Grundschutz methodology (2008), https://www.bsi.bund.de/cae/servlet/ contentblob/471430/publicationFile/27993/standard-100-2-e-pdf.pdf
-
(2008)
BSI-Standard 100-2: IT-Grundschutz Methodology
-
-
-
10
-
-
26444465547
-
Agile security using an incremental security architecture
-
Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. Springer, Heidelberg
-
Chivers, H., Paige, R., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57-65. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3556
, pp. 57-65
-
-
Chivers, H.1
Paige, R.2
Ge, X.3
-
15
-
-
77956603862
-
Engineering secure systems with ISO 26702 and 27001
-
Evans, R., Tsohou, A., Tryfonas, T., Morgan, T.: Engineering secure systems with ISO 26702 and 27001. In: 5th International Conference on System of Systems Engineering (2010)
-
5th International Conference on System of Systems Engineering (2010)
-
-
Evans, R.1
Tsohou, A.2
Tryfonas, T.3
Morgan, T.4
-
16
-
-
79551568227
-
-
Gesellschaft für Telematikanwendungen der Gesundheitskarte mbH
-
Gesellschaft für Telematikanwendungen der Gesundheitskarte mbH: Übergreifendes Sicherheitskonzept der Telematikinfrastruktur (2008), http://www.gematik.de/upload/gematik-DS-Sicherheitskonzept-V2.4.0-4493.zip
-
(2008)
Übergreifendes Sicherheitskonzept der Telematikinfrastruktur
-
-
-
17
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of Common Criteria, heuristics, and UMLsec
-
Houmb, S., Islam, S., Knauss, E., Jürjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. Requirements Engineering 15(1), 63-93 (2009)
-
(2009)
Requirements Engineering
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
22
-
-
33747610426
-
Innovative characteristics of small manufacturing firms
-
DOI 10.1108/14626000610680253
-
Laforet, S., Tann, J.: Innovative characteristics of small manufacturing firms. Journal of Small Business and Enterprise Development 13(3), 363-380 (2006) (Pubitemid 44263410)
-
(2006)
Journal of Small Business and Enterprise Development
, vol.13
, Issue.3
, pp. 363-380
-
-
Laforet, S.1
Tann, J.2
-
23
-
-
45849131284
-
Design of a modelling language for information system security risk management
-
Mayer, N., Heymans, P., Matulevicius, R.: Design of a modelling language for information system security risk management. In: Proceedings of the 1st International Conference on Research Challenges in Information Science, pp. 121-131 (2007)
-
(2007)
Proceedings of the 1st International Conference on Research Challenges in Information Science
, pp. 121-131
-
-
Mayer, N.1
Heymans, P.2
Matulevicius, R.3
-
24
-
-
79551516333
-
-
Ministerie van Binnenlandse Zaken en Koninkrijksrelaties
-
Ministerie van Binnenlandse Zaken en Koninkrijksrelaties: Afhankelijkheids- en kwetsbaarheidsanalyse (1996)
-
(1996)
Afhankelijkheids- en Kwetsbaarheidsanalyse
-
-
-
27
-
-
38049100950
-
Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases
-
Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. Springer, Heidelberg
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 408-415. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4714
, pp. 408-415
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
28
-
-
0003669844
-
-
Standards Australia/Standards New Zealand: AS/NZS 4360:2004
-
Standards Australia/Standards New Zealand: AS/NZS 4360:2004: Risk management (2004)
-
(2004)
Risk Management
-
-
-
29
-
-
77956325951
-
Usability of security specification approaches for UML design: A survey
-
Talhi, C., Mouheb, D., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Usability of security specification approaches for UML design: A survey. Journal of Object Technology 8(6), 103-122 (2009)
-
(2009)
Journal of Object Technology
, vol.8
, Issue.6
, pp. 103-122
-
-
Talhi, C.1
Mouheb, D.2
Lima, V.3
Debbabi, M.4
Wang, L.5
Pourzandi, M.6
-
30
-
-
63949084590
-
Model-driven business process security requirement specification
-
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture 55(4), 211-223 (2009)
-
(2009)
Journal of Systems Architecture
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
31
-
-
80053188165
-
Model-based qualitative risk assessment for availability of IT infrastructures
-
Zambon, E., Etalle, S., Wieringa, R., Hartel, P.: Model-based qualitative risk assessment for availability of IT infrastructures. In: Software and Systems Modeling, pp. 1-28 (2010)
-
(2010)
Software and Systems Modeling
, pp. 1-28
-
-
Zambon, E.1
Etalle, S.2
Wieringa, R.3
Hartel, P.4
|