-
1
-
-
0029707819
-
Goal-based requirements analysis
-
IEEE Computer Society Press, Washington, DC, USA
-
Anton AI (1996) Goal-based requirements analysis. In: Proceedings of the 2nd IEEE international conference on requirements engineering (ICRE'96), IEEE Computer Society Press, Washington, DC, USA, p 136.
-
(1996)
Proceedings of the 2nd IEEE international conference on requirements engineering (ICRE'96)
, pp. 136
-
-
Anton, A.I.1
-
2
-
-
84885793070
-
Modelling risk and identifying countermeasures in organizations
-
Springer-Verlag, Lecture Notes in Computer Science
-
Asnar Y, Giorgini P (2006) Modelling risk and identifying countermeasures in organizations. In: Proceedings of the 1st international workshop on critical information infrastructures security, Springer-Verlag, Lecture Notes in Computer Science, vol 4347, pp 55-66.
-
(2006)
Proceedings of the 1st international workshop on critical information infrastructures security
, vol.4347
, pp. 55-66
-
-
Asnar, Y.1
Giorgini, P.2
-
4
-
-
34548584164
-
-
Project deliverable A1. D2. 1, SERENITY consortium, EU-IST-IP 6th framework programme-SERENITY 27587
-
Asnar Y, Bonato R, Bryl V, Campagna L, Dolinar K, Giorgini P, Holtmanns S, Klobucar T, Lanzi P, Latanicki J, Massacci F, Meduri V, Porekar J, Riccucci C, Saidane A, Seguran M, Yautsiukhin A, Zannone N (2006) Security and privacy requirements at organizational level. Project deliverable A1. D2. 1, SERENITY consortium, EU-IST-IP 6th framework programme-SERENITY 27587.
-
(2006)
Security and privacy requirements at organizational level
-
-
Asnar, Y.1
Bonato, R.2
Bryl, V.3
Campagna, L.4
Dolinar, K.5
Giorgini, P.6
Holtmanns, S.7
Klobucar, T.8
Lanzi, P.9
Latanicki, J.10
Massacci, F.11
Meduri, V.12
Porekar, J.13
Riccucci, C.14
Saidane, A.15
Seguran, M.16
Yautsiukhin, A.17
Zannone, N.18
-
5
-
-
47949100642
-
Secure and dependable patterns in organizations: an empirical approach
-
IEEE Computer Society Press, Oakland, CA
-
Asnar Y, Bonato R, Giorgini P, Massacci F, Meduri V, Riccucci C, Saidane A (2007a) Secure and dependable patterns in organizations: an empirical approach. In: Proceedings of the 15th IEEE international requirements engineering conference, IEEE Computer Society Press, Oakland, CA.
-
(2007)
Proceedings of the 15th IEEE international requirements engineering conference
-
-
Asnar, Y.1
Bonato, R.2
Giorgini, P.3
Massacci, F.4
Meduri, V.5
Riccucci, C.6
Saidane, A.7
-
6
-
-
34548171255
-
From trust to dependability through risk analysis
-
IEEE Press, New York
-
Asnar Y, Giorgini P, Massacci F, Zannone N (2007b) From trust to dependability through risk analysis. In: Proceedings of the second international conference on availability, reliability and security, IEEE Press, New York.
-
(2007)
Proceedings of the second international conference on availability, reliability and security
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Zannone, N.4
-
9
-
-
0025791156
-
Software risk management: principles and practices
-
doi:10.1109/52.62930
-
Boehm BW (1991) Software risk management: principles and practices. IEEE Softw 8(1): 32-41. doi: 10. 1109/52. 62930.
-
(1991)
IEEE Softw
, vol.8
, Issue.1
, pp. 32-41
-
-
Boehm, B.W.1
-
10
-
-
85189788266
-
The CORAS methodology: model-based risk assessment using UML and UP
-
Idea Group Publishing, Hershey
-
den Braber F, Dimitrakos T, Gran BA, Lund MS, Stølen K, Aagedal JØ (2003) The CORAS methodology: model-based risk assessment using UML and UP. In: UML and the Unified Process, Idea Group Publishing, Hershey, pp 332-357.
-
(2003)
UML and the Unified Process
, pp. 332-357
-
-
den Braber, F.1
Dimitrakos, T.2
Gran, B.A.3
Lund, M.S.4
Stølen, K.5
Aagedal, J.Ø.6
-
11
-
-
3142750497
-
Tropos: an agent-oriented software development methodology
-
doi:10.1023/B:AGNT.0000018806.20944.ef
-
Bresciani P, Perini A, Giorgini P, Giunchiglia F, Mylopoulos J (2004) Tropos: an agent-oriented software development methodology. J Auton Agent Multi Agent Syst 8(3): 203-236. doi: 10. 1023/B: AGNT. 0000018806. 20944. ef.
-
(2004)
J Auton Agent Multi Agent Syst
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
13
-
-
0036036577
-
Security attribute evaluation method: a cost-benefit approach
-
ACM Press, New York, NY, USA, doi: 10. 1145/581339. 581370
-
Butler SA (2002) Security attribute evaluation method: a cost-benefit approach. In: Proceedings of the 24th international conference on software engineering, ACM Press, New York, NY, USA, pp 232-240. doi: 10. 1145/581339. 581370.
-
(2002)
Proceedings of the 24th international conference on software engineering
, pp. 232-240
-
-
Butler, S.A.1
-
14
-
-
0242650673
-
-
Tech. Rep. CMU/SEI-93-TR-6, Software Engineering Institute, Carnegie Mellon University
-
Carr MJ, Konda SL, Monarch I, Ulrich FC, Walker CF (1993) Taxonomy-based risk identification. Tech. Rep. CMU/SEI-93-TR-6, Software Engineering Institute, Carnegie Mellon University.
-
(1993)
Taxonomy-based risk identification
-
-
Carr, M.J.1
Konda, S.L.2
Monarch, I.3
Ulrich, F.C.4
Walker, C.F.5
-
16
-
-
41149092628
-
Fusing quantitative requirements analysis with model-based systems engineering
-
IEEE Computer Society Press, Los Alamitos, CA, USA, doi: 10. 1109/RE. 2006. 24
-
Cornford SL, Feather MS, Heron VA, Jenkins JS (2006) Fusing quantitative requirements analysis with model-based systems engineering. In: Proceedings of the 14th IEEE international requirements engineering conference, IEEE Computer Society Press, Los Alamitos, CA, USA, pp 279-284, doi: 10. 1109/RE. 2006. 24.
-
(2006)
Proceedings of the 14th IEEE international requirements engineering conference
, pp. 279-284
-
-
Cornford, S.L.1
Feather, M.S.2
Heron, V.A.3
Jenkins, J.S.4
-
18
-
-
16244392439
-
Towards a unified approach to the representation of, and reasoning with, probabilistic risk information about software and its system interface
-
IEEE Computer Society Press, Silver Spring, MD
-
Feather MS (2004) Towards a unified approach to the representation of, and reasoning with, probabilistic risk information about software and its system interface. In: Proceedings of the 15th IEEE international symposium on software software reliability engineering, IEEE Computer Society Press, Silver Spring, MD, pp 391-402.
-
(2004)
Proceedings of the 15th IEEE international symposium on software software reliability engineering
, pp. 391-402
-
-
Feather, M.S.1
-
19
-
-
0242371015
-
Formal reasoning techniques for goal models
-
Giorgini P, Mylopoulos J, Nicchiarelli E, Sebastiani R (2003) Formal reasoning techniques for goal models. J Data Semantics 1(1): 1-20.
-
(2003)
J Data Semantics
, vol.1
, Issue.1
, pp. 1-20
-
-
Giorgini, P.1
Mylopoulos, J.2
Nicchiarelli, E.3
Sebastiani, R.4
-
20
-
-
15944398393
-
A software fault tree approach to requirements analysis of an intrusion detection system
-
Helmer G, Wong J, Slagell M, Honavar V, Miller L, Lutz R (2002) A software fault tree approach to requirements analysis of an intrusion detection system. Requir Eng J 7(4): 207-220.
-
(2002)
Requir Eng J
, vol.7
, Issue.4
, pp. 207-220
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
21
-
-
11144304109
-
Defining risk
-
Holton GA (2004) Defining risk. Financ Anal J 60(6): 19-25.
-
(2004)
Financ Anal J
, vol.60
, Issue.6
, pp. 19-25
-
-
Holton, G.A.1
-
24
-
-
0039503784
-
HAZOP-past and future
-
Kletz TA (1997) HAZOP-past and future. Reliab Eng Syst Saf 55(3): 263-266.
-
(1997)
Reliab Eng Syst Saf
, vol.55
, Issue.3
, pp. 263-266
-
-
Kletz, T.A.1
-
25
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
doi:10.1109/32.879820
-
van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26(10): 978-1005. doi: 10. 1109/32. 879820.
-
(2000)
IEEE Trans Softw Eng
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
29
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Springer-Verlag, Lecture Notes in Computer Science
-
Lodderstedt T, Basin D, Doser J (2002) SecureUML: A UML-based modeling language for model-driven security. In: Proceedings of the 5th international conference on the unified modeling language-the language and its applications, Springer-Verlag, Lecture Notes in Computer Science, vol 2460, pp 426-441.
-
(2002)
Proceedings of the 5th international conference on the unified modeling language-the language and its applications
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
30
-
-
0031499162
-
Requirements analysis using forward and backward search
-
Lutz RR, Woodhouse RM (1997) Requirements analysis using forward and backward search. Ann Softw Eng 3(1): 459-475.
-
(1997)
Ann Softw Eng
, vol.3
, Issue.1
, pp. 459-475
-
-
Lutz, R.R.1
Woodhouse, R.M.2
-
33
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
Phoenix, AZ, USA, doi: 10. 1109/CSAC. 1999. 816013
-
McDermott J, Fox C (1999) Using abuse case models for security requirements analysis. In: Proceedings of 15th annual computer security applications conference, Phoenix, AZ, USA, pp 55-64. doi: 10. 1109/CSAC. 1999. 816013.
-
(1999)
Proceedings of 15th annual computer security applications conference
, pp. 55-64
-
-
McDermott, J.1
Fox, C.2
-
34
-
-
0004198635
-
-
4th edn., Englewood, Cliffs, NJ: Prentice-Hall
-
Pfleeger CP, Pfleeger SL (2006) Security in computing, 4th edn. Prentice-Hall, Englewood, Cliffs, NJ.
-
(2006)
Security in Computing
-
-
Pfleeger, C.P.1
Pfleeger, S.L.2
-
35
-
-
79952954908
-
A framework for risk analysis in software engineering
-
IEEE Computer Society Press, Washington, DC, USA
-
Roy GG, Woodings TL (2000) A framework for risk analysis in software engineering. In: Proceedings of the seventh Asia-Pacific software engineering conference (APSEC '00), IEEE Computer Society Press, Washington, DC, USA, p 441.
-
(2000)
Proceedings of the seventh Asia-Pacific software engineering conference (APSEC '00)
, pp. 441
-
-
Roy, G.G.1
Woodings, T.L.2
-
36
-
-
0002670359
-
Attack trees: modeling security threats
-
Schneier B (1999) Attack trees: modeling security threats. Dr Dobbï J 12(24): 21-29.
-
(1999)
Dr Dobbï J
, vol.12
, Issue.24
, pp. 21-29
-
-
Schneier, B.1
-
37
-
-
35048899193
-
Simple and minimum-cost satisfiability for goal models
-
Springer-Verlag Heidelberg, Lecture Notes in Computer Science doi: 10. 1007/b98058
-
Sebastiani R, Giorgini P, Mylopoulos J (2004) Simple and minimum-cost satisfiability for goal models. In: Proceedings of the 16th conference on advanced information systems engineering, Springer-Verlag Heidelberg, Lecture Notes in Computer Science, vol 3084, pp 20-33. doi: 10. 1007/b98058.
-
(2004)
Proceedings of the 16th conference on advanced information systems engineering
, vol.3084
, pp. 20-33
-
-
Sebastiani, R.1
Giorgini, P.2
Mylopoulos, J.3
-
40
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
doi:10.1007/s00766-004-0194-4
-
Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng J 10(1): 34-44. doi: 10. 1007/s00766-004-0194-4.
-
(2005)
Requir Eng J
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
42
-
-
9444250310
-
-
Washington, DC: NASA
-
Stamatelatos M, Vesely W, Dugan J, Fragola J, Minarick J, Railsback J (2002) Fault tree handbook with aerospace applications. NASA.
-
(2002)
Fault Tree Handbook with Aerospace Applications
-
-
Stamatelatos, M.1
Vesely, W.2
Dugan, J.3
Fragola, J.4
Minarick, J.5
Railsback, J.6
|